Sponsored Links

Sponsored Links

PS3 NAND Dump Extractor released!


Sponsored Links
364w ago - Tonight mainman has released the PS3 NAND Dump Extractor/Unpacker that has been in the works for awhile!

Download: PS3 NAND Dump Extractor

It comes with a Windows and Linux binary as well as source code, and those without an Infectus Mod can still experiment with it using the following 'dumpable dumps' files (via PS3 Infectus) available in iRC EFnet #PS3News when merged:

samsungk9f1g08uoa_a-_www.PS3News.com_.rar [54.2 MB (56,925,643 bytes)]

samsungk9f1g08uoa_b_usb-_www.PS3News.com_.rar [54.4 MB (57,066,577 bytes)]

From the ReadMe file: This tool is used to interleave, then byteswaps both dumps of the PS3 NAND. Upon completion, it creates a 'user readable' file.

This file is then scanned by the tool, and the flash files are extracted to a folder. This folder is named PS3Nand-XXX.XXXX, where XXX.XXXX is the SDK Version magic in the flash (usually the version number of the firmware)

.B .A usually works, however in some cases .A .B order is required.

Please post any feedback in our PlayStation 3 Dev Chat Forum HERE!


Stay tuned for more PS3 Hacks and PS3 CFW news, follow us on Twitter, Facebook and be sure to drop by the PS3 Hacks and PS3 Custom Firmware Forums for the latest PlayStation 3 scene and PlayStation 4 scene updates and fresh homebrew releases!

Comments 27 Comments - Go to Forum Thread »

• Please Register at PS3News.com or Login to make comments on Site News articles.
 
#27 - ggparallel - 364w ago
ggparallel's Avatar
Quote Originally Posted by CJPC View Post
Its a marker, not put there by us, but by Sony. It was there in our original dumps, we think its some sort of flag to mark the start of the data below it. However at the moment it is just a hypothesis.

Also, yes some of those files are encrypted (even more than a SELF), makes it a bit more secure!

It's also a fixed position in different dumps , and few after you have the FS descriptor and the files ( relocated ). As CJPC told files are encrypted on NAND so don't expect to find ( apart few parts ) clear text or a lot of strings.

My iphotesys , ad speculation , is that PS3 search for that fixed address during the boot process , it is still not clear to me if the code loaded during the ringbus configuration on cell resides on NAND or on another chip ( the toshiba thing. ) and at which stage this fixed address is used.

#26 - CJPC - 364w ago
CJPC's Avatar
Quote Originally Posted by einzwei View Post
at offset 03F80010 in merged NAND file I found this: 000000000FACE0FF00000000DEADBEEF ---- FACE0FF and DEADBEEF constants.

What is it? is it some mark leaved by owner of dumped PS3? (securing identifiable personal data presumably?) or is it some constants leaved by $ony developers?

Please, clear this question in order not to give a false leads to people who makes research


Its a marker, not put there by us, but by Sony. It was there in our original dumps, we think its some sort of flag to mark the start of the data below it. However at the moment it is just a hypothesis.

Also, yes some of those files are encrypted (even more than a SELF), makes it a bit more secure!

#25 - einzwei - 364w ago
einzwei's Avatar
Quote Originally Posted by gladiac View Post
lol, very nice find . I think it looks the same on my machine as an your's (but it does not look bad to me) -> That is what I did:

What do you mean by that? Have you dumped your own NAND? or did you download it from the internet?

#24 - gladiac - 364w ago
gladiac's Avatar
Quote Originally Posted by einzwei View Post
at offset 03F80010 in merged NAND file I found this: 000000000FACE0FF00000000DEADBEEF ---- FACE0FF and DEADBEEF constants.

What is it? is it some mark leaved by owner of dumped PS3? (securing identifiable personal data presumably?) or is it some constants leaved by $ony developers?

Please, clear this question in order not to give a false leads to people who makes research

lol, very nice find . I think it looks the same on my machine as an your's (but it does not look bad to me) -> That is what I did:


[Register or Login to view code]



And this is what I got:

[Register or Login to view code]




[Register or Login to view code]


All the .self files seem to be encrypted or something. So far, this looks good to me, but I'm not a professional so I can also be wrong.

cheers

#23 - einzwei - 364w ago
einzwei's Avatar
at offset 03F80010 in merged NAND file I found this: 000000000FACE0FF00000000DEADBEEF ---- FACE0FF and DEADBEEF constants.

What is it? is it some mark leaved by owner of dumped PS3? (securing identifiable personal data presumably?) or is it some constants leaved by $ony developers?

Please, clear this question in order not to give a false leads to people who makes research

 

Sponsored Links

Sponsored Links
Sponsored Links

Sponsored Links







Advertising - Affiliates - Contact Us - PS3 Downloads - PS3 Forums - Privacy Statement - Site Rules - Top - © 2015 PlayStation 3 News