Sponsored Links

Sponsored Links

Page 2 of 8 FirstFirst 1234 ... LastLast
Results 11 to 20 of 73



  1. #11
    Registered User shadowi's Avatar
    Join Date
    Feb 2010
    Posts
    9
    Sponsored Links
    Sponsored Links
    Quote Originally Posted by itsmonkey View Post
    Are you, by any chance, Chapix?
    Yes, I am chapix (lan.st) We can do like this:
    Code:
    //Descryption of device
    struct UsbDeviceDescriptor UsbDevDecr = 
    {
    	.bLength = 18, 
    	.bDescriptorType = 0x01, 
    	.bcdUSB = 0x200, 
    	.bDeviceClass = 0, 
    	.bDeviceSubClass = 0, 
    	.bDeviceProtocol = 0, 
    	.bMaxPacketSize = 64, 
    	.idVendor = 0, 
    	.idProduct = 0, 
    	.bcdDevice = 0x100, 
    	.iManufacturer = 0, 
    	.iProduct = 0, 
    	.iSerialNumber = 0,
    	.bNumConfigurations = 1
    };
    ...
    
    //Regist our device
    int sceUsbbdRegister ( struct UsbDriver * drv)
    Last edited by shadowi; 08-26-2010 at 01:08 PM Reason: Automerged Doublepost

  2. #12
    Senior Member Mantagtj's Avatar
    Join Date
    Feb 2008
    Posts
    294
    Sponsored Links
    Sponsored Links
    oh this IS an exiting thread cant do much but have a PSP, so if you need any testers for the slim 120 let me know happy to help.
    MantaGTJ

  3. #13
    Registered User whinis's Avatar
    Join Date
    Jan 2010
    Posts
    133
    Sponsored Links
    Sponsored Links
    I have a psp 1000 and a 60gb ps3 fat can test.

  4. #14
    Contributor segobi's Avatar
    Join Date
    Aug 2010
    Posts
    14
    Here is some information:
    Code:
    Value 
     
    Hardware ID 
     USB\UNKNOWN 
     
    Setup Class 
     USB 
     
    Class GUID 
     {36fc9e60-c465-11cf-8056-444553540000} 
     
    PDO Name 
     \Device\USBPDO-4 
     
    Parameter 
     Value 
     
    Connection Information 
     
    ConnectionIndex 
     0x2 
     
    CurrentConfigurationValue 
     0x0 
     
    LowSpeed 
     TRUE 
     
    DeviceIsHub 
     FALSE 
     
    DeviceAddress 
     0x3 
     
    NumberOfOpenPipes 
     0x0 
     
    ConnectionStatus 
     DeviceConnected 
     
    Device Descriptor 
     
    bLength 
     0x12 
     
    bcdUSB 
     0x200 
     
    bDeviceClass 
     0x9 (Hub) 
     
    bDeviceSubClass 
     0x0 
     
    bDeviceProtocol 
     0x1 
     
    bMaxPacketSize0 
     0x8 
     
    idVendor 
     0xAAAA 
     
    idProduct 
     0xCCCC 
     
    bcdDevice 
     0x100 
     
    iManufacturer 
     0x0 
     
    iProduct 
     0x0 
     
    iSerialNumber 
     0x0 
     
    bNumConfigurations 
     0x1

  5. #15
    Registered User shadowi's Avatar
    Join Date
    Feb 2010
    Posts
    9
    Thanks, have you any info about Interface and EndPoint ?

    it lacks information!?
    Last edited by shadowi; 08-26-2010 at 03:34 PM Reason: Automerged Doublepost

  6. #16
    Registered User thirdq's Avatar
    Join Date
    Jan 2010
    Posts
    4

    usb dump

    Is there anyone at all that has the usbdongle ?

    Wouldn't it be pretty stright forward making a usb emulator using a unit with usb-device port (like an android phone), and a regular pc which forwards the usb communication to the phone thru wifi?

    with this setup, we could get an complete dump of a session doing all the "magic" this dongle does, and be able to make the emulator just repeat the steps without the dongle.

    but of course, we still need someone with the real hardware

    --goodie

  7. #17
    Member PSGamer24's Avatar
    Join Date
    Jun 2010
    Posts
    56
    Can someone better translate this [Register or Login to view links]

  8. #18
    Senior Member Mbb's Avatar
    Join Date
    Jan 2010
    Posts
    323

    PSJailBreak Reverse Engineered, Requires Hardware to Update

    Quote Originally Posted by PSGamer24 View Post
    Can someone better translate this [Register or Login to view links]
    Translated with google:
    We have the PSJailbreak dongle yet again brought out of retirement to put it more precisely Herbs to take a closer look. We tell you here in brief the main steps of the internal process of PSJailbreak.

    We can confirm that it can not confirm that PSJailbreak a clone of Sony's "Jig" is module. We can confirm that it can not confirm that a clone of PSJailbreak Sony's "Jig" is module. PSJailbrak is an exploit honest self-developed. PSJailbrak exploit is an honest self-developed. The chip is not but a PIC18F444 ATMega with software USB. The chip is not but a PIC18F444 ATMega with software USB. This means the chip is internally capable of USB to emulate.

    This means the chip is internally capable of USB to emulate. PSJailbreak mainly be emulated 6Port a USB hub connected to a specific end USB devices and then disconnected. PSJailbreak mainly be emulated 6Port a USB hub connected to a specific end USB devices and then disconnected. One of these devices has the ID of Sony's "Jig" module, which means that played in the development of PSJailbreaks the "Jig" module, a certain role. One of these devices has the ID of Sony's "Jig" module, which means that played in the development of PSJailbreaks the "Jig" module, a certain role.

    But let's start at the front: When the PS3 is clamped in the USB emulation device, which has a much too big Configuration Descriptor. But let's start at the front: When the PS3 is clamped in the USB emulation device, which has a much too big Configuration Descriptor. This Descriptor überschriebt the stack with a PowerPC contained code that is executed.

    This Descriptor überschriebt the stack with a PowerPC contained code that is executed. Now, various USB devices are connected in the emulation. Now, various USB devices are connected in the emulation. A device has a large 0xAD Descriptor, which is part of the exploit and contains static data. A device has a large 0xAD Descriptor, which is part of the exploit and contains static data. A short time later (we are moving here in Milisekundenbereich) the jig module is connected, and encrypted data are transmitted to the module jig.

    A later short time (we are moving here in Milisekundenbereich) the jig module is connected, and encrypted data are transmitted to the module jig. A (in Milisekundenbereich) eternity later, the answers Jig 64Byte module with static data, all USB devices are disconnected, a new USB device is connected and the PS3 launches with a new look. A (in Milisekundenbereich) eternity later, the answers Jig 64Byte module with static data, all USB devices are disconnected, a new USB device is connected and the PS3 launches with a new look.

    64Byte static data that is emulated by the PS3 64Byte Jig sent to the static data that is emulated by Jig sent to the PS3

    Extract from the USB stream Extract from the USB stream

    Incidentally PSJailbreak is NOT updateable. Incidentally PSJailbreak is NOT updateable. The Update feature can be mentioned, if realized at all, only with additional hardware. The Update feature can be mentioned, if realized at all, only with additional hardware.
    Attached Thumbnails<br><br> Attached Thumbnails

    ubstream.jpg  

  9. #19
    Senior Member EiKii's Avatar
    Join Date
    Mar 2010
    Posts
    333
    google translate ftw hehe, almost makes sense hehe

    oh and a lot of doubles apperently.
    PSJailbreak reverse engineered

    We took the PSJailbreak dongle out of the drawer again to examine it a bit more in detail. Now we´ll give you a short explaination on the important steps that take place inside of the dongle.

    We can confirm that PSJailbreak is in fact no simple clone of Sony´s “Jig” modul, instead it´s an honest, self developed exploit. The Chip inside is no PIC18F444 but an ATMega with USB-software. That means that the chip is capable of internal USB emulation. PSJailbreak mainly emulates a 6-port USB-hub to that several USB-devices get connected and disconnected in a speciffic sequence. One of these devices has the ID of Sony´s “Jig” modul, so that means that the “Jig” played a certain role during the development of PSJailbreak.

    But first things first: When switching the PS3 on, a device is connected within the USB-emulation, which has a too large configuration descriptor. This discriptor overwrites the stack with contained PowerPC-code that is executed. Now various other devices get connected within the emulation. One device has a 0xAD large descriptor that is part of the exploit and contains static data. Short time later (we´re talking about milliseconds here) the “Jig” gets connected and encrypted data is sent to the “Jig”.
    An eternity later (in milliseconds that is) the “Jig” answers with 64Bytes of static data, all USB-devices get disconnected, a new device is connected and the PS3 restarts in a new look.

    By the way: The PSJailbreak is not updateable. The noted update-feature can, if at all, only be carried out with additional hardware.
    Last edited by EiKii; 08-26-2010 at 05:33 PM

  10. #20
    Registered User xantra's Avatar
    Join Date
    Aug 2010
    Posts
    22
    I don't understand, it's a PIC or not??

 

Sponsored Links
Page 2 of 8 FirstFirst 1234 ... LastLast
Affiliates - Contact Us - PS3 Downloads - Privacy Statement - Site Rules - Top - © 2014 PlayStation 3 News