Sponsored Links

Sponsored Links

PS3 NAND Dump Extractor released!


Sponsored Links
348w ago - Tonight mainman has released the PS3 NAND Dump Extractor/Unpacker that has been in the works for awhile!

Download: PS3 NAND Dump Extractor

It comes with a Windows and Linux binary as well as source code, and those without an Infectus Mod can still experiment with it using the following 'dumpable dumps' files (via PS3 Infectus) available in iRC EFnet #PS3News when merged:

samsungk9f1g08uoa_a-_www.PS3News.com_.rar [54.2 MB (56,925,643 bytes)]

samsungk9f1g08uoa_b_usb-_www.PS3News.com_.rar [54.4 MB (57,066,577 bytes)]

From the ReadMe file: This tool is used to interleave, then byteswaps both dumps of the PS3 NAND. Upon completion, it creates a 'user readable' file.

This file is then scanned by the tool, and the flash files are extracted to a folder. This folder is named PS3Nand-XXX.XXXX, where XXX.XXXX is the SDK Version magic in the flash (usually the version number of the firmware)

.B .A usually works, however in some cases .A .B order is required.

Please post any feedback in our PlayStation 3 Dev Chat Forum HERE!


Stay tuned for more PS3 Hacks and PS3 CFW news, follow us on Twitter and be sure to drop by the PS3 Hacks and PS3 Custom Firmware Forums for the latest PlayStation 3 scene updates and homebrew releases!

Comments 27 Comments - Go to Forum Thread »

• Please Register at PS3News.com or Login to make comments on Site News articles. Thanks!

ggparallel's Avatar
#27 - ggparallel - 348w ago
Its a marker, not put there by us, but by Sony. It was there in our original dumps, we think its some sort of flag to mark the start of the data below it. However at the moment it is just a hypothesis.

Also, yes some of those files are encrypted (even more than a SELF), makes it a bit more secure!
It's also a fixed position in different dumps , and few after you have the FS descriptor and the files ( relocated ). As CJPC told files are encrypted on NAND so don't expect to find ( apart few parts ) clear text or a lot of strings.

My iphotesys , ad speculation , is that PS3 search for that fixed address during the boot process , it is still not clear to me if the code loaded during the ringbus configuration on cell resides on NAND or on another chip ( the toshiba thing. ) and at which stage this fixed address is used.

CJPC's Avatar
#26 - CJPC - 348w ago
at offset 03F80010 in merged NAND file I found this: 000000000FACE0FF00000000DEADBEEF ---- FACE0FF and DEADBEEF constants.

What is it? is it some mark leaved by owner of dumped PS3? (securing identifiable personal data presumably?) or is it some constants leaved by $ony developers?

Please, clear this question in order not to give a false leads to people who makes research

Its a marker, not put there by us, but by Sony. It was there in our original dumps, we think its some sort of flag to mark the start of the data below it. However at the moment it is just a hypothesis.

Also, yes some of those files are encrypted (even more than a SELF), makes it a bit more secure!

einzwei's Avatar
#25 - einzwei - 348w ago
lol, very nice find . I think it looks the same on my machine as an your's (but it does not look bad to me) -> That is what I did:
What do you mean by that? Have you dumped your own NAND? or did you download it from the internet?

gladiac's Avatar
#24 - gladiac - 348w ago
at offset 03F80010 in merged NAND file I found this: 000000000FACE0FF00000000DEADBEEF ---- FACE0FF and DEADBEEF constants.

What is it? is it some mark leaved by owner of dumped PS3? (securing identifiable personal data presumably?) or is it some constants leaved by $ony developers?

Please, clear this question in order not to give a false leads to people who makes research
lol, very nice find . I think it looks the same on my machine as an your's (but it does not look bad to me) -> That is what I did:




And this is what I got:





All the .self files seem to be encrypted or something. So far, this looks good to me, but I'm not a professional so I can also be wrong.

cheers

einzwei's Avatar
#23 - einzwei - 348w ago
at offset 03F80010 in merged NAND file I found this: 000000000FACE0FF00000000DEADBEEF ---- FACE0FF and DEADBEEF constants.

What is it? is it some mark leaved by owner of dumped PS3? (securing identifiable personal data presumably?) or is it some constants leaved by $ony developers?

Please, clear this question in order not to give a false leads to people who makes research

Sponsored Links

Sponsored Links
Sponsored Links

Sponsored Links







Affiliates - Contact Us - PS3 Downloads - Privacy Statement - Site Rules - Top - © 2014 PlayStation 3 News