Finally, from JonahUK: "SWORDFISH" is used in mM, possibly to check for content:
Offset(h) 00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F
00271C90 64 31 2D 6E 70 00 00 00 64 31 2D 6E 70 2E 73 77 d1-np...d1-np.sw
00271CA0 6F 72 64 66 69 73 68 2E 73 74 6F 72 65 2E 73 6F ordfish.store.so
00271CB0 6E 79 65 6E 74 65 72 74 61 69 6E 6D 65 6E 74 6E nyentertainmentn
00271CC0 65 74 77 6F 72 6B 2E 63 6F 6D 00 00 00 00 00 00 etwork.com......
Update: PSNSSS - Patched
Dear SONY employee,
Congratulations for finding the ridiculous mistake and fixing it It took you guys over 1 week and probably external consultation to solve this problem. The question is why did it take so long and how was it even possible to miss this important step of security which any skiddy can setup easily?
I don't blame you since I know how large your network is, but if it takes one guy hours and one damn huge company days to find such a vulnerability, something is wrong don't cha think so?
Sadly I have to tell you that it was part of the plan, simply to check your resources and capabilities. Sorry, had to know how much time I'd possibly have to grab the data from the really interesting sources We both know that this part of the network won't be used for long anymore. Therefor I will switch over to the new target now and leave you a well-intentioned advice:
Do not outsource all your data storages externally, most of them are even weaker than your own spaces.
Stay tuned for more PS3 Hacks and PS3 CFW news, follow us on Twitter and be sure to drop by the PS3 Hacks and PS3 Custom Firmware Forums for the latest PlayStation 3 scene updates and homebrew releases!
Today German PlayStation 3 hacker SKFU has https://twitter.com/SKFU_PS3/status/330060565898743810 that the first PlayStation 4 (PS4) / Orbis products have been spotted via PSN.
While there aren't many details available yet besides the picture below, here is what he states:
PS4 - PSN preparations began. Time to start research
First PS4/Orbis products already spotted via PSN, getting interested
From Wololo (via wololo.net/2013/05/03/ps4-test-data-and-upcoming-content-spotted-on-psn-by-hacker/): PS4 Test Data and upcoming content spotted on PSN by hacker
PS3 scene member SKFU is known for his habit of sniffing and manipulating networks packets (in particular he likes to tinker the stuff Sony doesn’t necessarily want you to see when communications happen between your home network and the PSN). Today he spotted some content on the PSN that seems to be test data for the upcoming PS4.
Using what is apparently a private tools of his (interestingly named “psnsss” a.k.a. PSN Store Secrets Search), SKFU has found some test products related to the PS4, on the PSN. He revealed his findings with a simple screenshot that can be found below.
From what I can see on the screenshot, the test data is not directly available on the regular “retail” PSN servers, but on the servers used by Sony internally for development or for QA (internal beta tests, if you prefer): this is what the “Environment” values seem to imply in SKFU’s screenshot below.
For more details you can check the wiki, but basically everything starting with a “D” (e.g. D1-NP) in that list is an internal development server, and everything starting with a Q is a QA server. I am not sure what “E” stands for.
The test data itself is not revealing much. Cryptic product IDs and generic product names such as “Storefront inclusion test – Game PS4 product” or “Game Franchise with PS4 representative”, or again “Orbis test data”. Although I must say I like the one product that contains the string “WOLO” in it
More interesting to me is the fact that people like SKFU seem to have access to some of Sony’s internal PSN servers, somehow. Well, I’m sure this is no news to the people who have been deeply involved in the PS3 scene, but it is to me, and I think it’s pretty badass!
As always, more details will come as they are available.