Sponsored Links

Sponsored Links

PS3 CFW Folder Checker Homebrew App and Source Code Arrive


Sponsored Links
160w ago - This weekend PlayStation 3 developer PsDev has released a homebrew application called PS3 CFW Folder Checker along with the source code as well, followed by Check_PKG and HashCalc by eminem451 with details below.

Download: [Register or Login to view links] / [Register or Login to view links] / [Register or Login to view links] / [Register or Login to view links] by eminem451

From the included ReadMe file: Just place the .exe file in your flash drive where you have your folders and cfw setup run it and it will tell you if there is a typo, the foldername correct, the pup name correct and then if so it tell you your ready to go.

Took me 5 min.

Follow me on twitter at [Register or Login to view links]

Source Code:

[Register or Login to view code]


Finally, from PsDev on PS3 lv0: [Register or Login to view links]

[Register or Login to view code]

From eminem451 also comes Check_PKG (linked above), who states the following:

Hi, a quick tool to check if your PKG is not altered. This will verify a single PKG file or a whole directory.

[Register or Login to view code]

Options:

[Register or Login to view code]

There are x86 and x64 version in the zip, use the one you need.

  • check_pkg: only return a code (0 = OK, anything else = ERROR), more usefull for dev using other app calling it.
  • check_pkg_dbg: same as "check_pkg" but outputs messages.
  • check_pkg_dbgc: same as check_pkg_dbg but PAUSES after any errors when checking directory and has a progress bar, better of the 3 releases for common user.

Check_pkg_dbgc is recommended for common user. Use this after downloading a PKG to be sure it is not corrupted.

Update: I updated my software, it now handles debug PKG better, and can check ECDSA signature from retails one.

HashCalc

Hi, I made a little app (linked above) to calculate hash from files. i limited it to a few algo for this edition, let me know what you think of it.

Info: Drag and drop file on it will save time.

  • If you are on win8.1, right click on hashcalc.exe, unlock.
  • This app handle mode than 200 hashing algos; i locked it for this edition (SHA3, MD6, BLAKE...), making it easier for everyone.
  • With this app, you can compute MD5 or SHA1 of any files, it may help you checking PUP's MD5 for example.

HMAC is available on full version, tell me if you need it.

Info: Not all algos are listed alphabetically, it's normal, i sort them myself, sometimes alphabetically and sometimes by genre, there is no problems with it.

On 21/12/2014, removed French version, removed X64 Version, this way, there only is one version. A few bug fixed.

Version 1.1.3: Unlocked PS Debug PKG Hash, there are many hashes in debug PKGs, first one is stored at offset 0x80, use my app with this algo and set size to 0x80, check then hash in file at offset 0x80, if it matches, PKG is OK, else it wasnt built correctly or was altered.

I noted that, debug PKG made by proper tools (SDK ones) have good hashes, a few others, i think made by that ugly python script dont. Any PKG made by make_pkg_npdrm (official) has these hashes correct.

EAHash Unlocked too, a md5 derivation used in some game saves.

Update 1.1.3 Changelog:

  • Added PS3 Debug PKG Hash algo, EAHash, and a few UI bug fixes.




Stay tuned for more PS3 Hacks and PS3 CFW news, follow us on Twitter, Facebook and be sure to drop by the PS3 Hacks and PS3 Custom Firmware Forums for the latest PlayStation 3 scene and PlayStation 4 scene updates and fresh homebrew releases!

Comments 52 Comments - Go to Forum Thread »

• Please Register at PS3News.com or Login to make comments on Site News articles.
 
#22 - PS3 News - 149w ago
PS3 News's Avatar
Not long after the initial release comes PS3Tools GUI Edition version 1.1 of the PlayStation 3 homebrew application by PS3 developer [Register or Login to view links] with the changelog outlined below.

Download: [Register or Login to view links]

Below are the changes, to quote:

Changes

GUI has been changed a lot:

  • added some cleaner selection of tools
  • not as many screens
  • faster
  • less memory

Bug Fixes

Only1, but it was a big one:

  • fixed the bug that would duplicate the process and not allow you to delete, move or do anything to the program.


More PlayStation 3 News...

#21 - moonwalker7 - 150w ago
moonwalker7's Avatar
The Appldr from 3.60 + firmware has been encapsulated in lv0. So we must first access the lv0 (not yet decrypted). In firmware 3.60-instead appldr is independent of other processes. If you change the system so that the install package files installs games appldr using of the firmware 3.55 (which we know keys), so installing a backup managers, which mounts the boot path of the games and then uses the appldr of the firmware 4.00.

That system uses 2 processes appldr, the 3.55, which installs the homebrew, and appldr (that of the Sony OFW) who starts the game 4.00.

A CFW obtained with a scrum of the various self of the core_os (4.00 and 3.55) but with a bit of reprogramming, so that uses two processes, depending on the function

#20 - elser1 - 151w ago
elser1's Avatar
good stuff.. thanks for that i'm sure i'll use it someday..

#19 - PS3 News - 151w ago
PS3 News's Avatar
Today PlayStation 3 developer [Register or Login to view links] has made available PS3Tools GUI Edition, which is a suite consisting of several PlayStation 3 utility PC applications.

Download: [Register or Login to view links]

To quote: Features:

  • Can unpack any "PS3" Firmware up to date. Gets really fast after first or second use.
  • A console is built into the program showing you the exact log a cmd would.
  • Can Decrypt PS3/PSP retail PKG files (Signed by sony installable via OFW).
  • Can readself of, Appldr, lv0, lv1ldr, lv2ldr, isoldr, EBOOT.BIN or if any of the things that you want to read are not listed on a button you can run a custom command to do it, for example: aim_spu_module.self just type that in where it says input and it will read it. So any file that is possible to use via readself, can be done in a fast manor 1-2 sec.
  • A full featured .Conf editor. view .Conf files edit them then hit save button when finished.
  • A awesome Core_os_package tool that can decrypt, extract and encrypt the Core_os_package.pkg all in about 1-2 sec.
  • Sign pkg for 3.55 or 3.41
  • UnSELF a file.
  • Build SELF a file.
  • Whenever a tar file is modified, it's permissions need to be set, this tool can do that for you. fix the tar file for the following FW. retail fw up to 3.72, debug fw up to 3.72 and retail and debug fw 4.0.

Usage:

Lets use a example: If you want to unpack a ps3 update just get the PS3UPDAT.PUP

(Don't change the name of any file in ps3 FW keep original) and put in tool folder, run my program click unpack and it will unpack it.

So like if you want to fix tar make sure the update_files.tar stays the same name and put in the main folder where program is located. same for anyfile keep the original name. So it's pretty simple just drag the file that you want the tool to do something with and keep the original name.

Here is a video I made (I am pretty bad a videos) to help it' a tutorial that covers everything. If some one else could make a better one that would be awesome.





Notes: PS3Tools GUI Edition will create two new files for the Core_os_package. "decrypted_core_os" and "CORE_OS_PACKAGE_ENCRYPTED.pkg" don't change the name of the decrypted one or else you won't be able to encrypt it

BETA Tester Thoughts: Tested by jhax78

All those command line tools that takes loads of time and sometimes commands that you need to understand will be replaced by this 1 click tool, even a trained monkey could extract repack sign with this now.. it's taking literally 3 seconds to extract a pup resign or whatever you need to do.

I'm no dev but like to poke around in stuff and i think more ppl think like this with this tool all that is just peanuts now.

More PlayStation 3 News...

#18 - enoughbr - 152w ago
enoughbr's Avatar
Developer PsDev is back again today with another article (psx-scene.com/forums/content/possible-1885/) for everyone to read and enjoy. This time, the topic revolves around a possible PS3 4.0 exploit, and the theory around it. This is information that he would like to share with the scene, in hopes of change and overcoming the current barriers to jailbreaking the PS3 console. Feedback welcomed, as PsDev has put a lot of thought and time into this theory.

OK so lets get right to it. This is a theory, nothing more.

There has been information available for quite some time. and I took it, thought about it, researched and experimented and I come out with my theory below to exploit 4.00 part of the way. This is not a random theory to, this is logical stuff and true facts. I'm providing this info for other devs to look at and lets see if this can work. I don't keep my work to my self, I like to share in give other people chances in discovering stuff. It always makes me happy when someone finds something out using my work, it just tells me I did a good job in describing and helping and they did a good job in listening and learning the material in order to trigger the exploit or whatever it might be.

So the lv2ldr verifys decrypts the lv2_kernal.self. we can get the address of this happening. inside Parameters Layout there are arguments, they are used as commands basically to load a function you want to use. they start in the lv2 @ 0x3E800(seems to be same for other ldrs) that address. There is a argument that is called lv2_in and lv2_out (we have know about these) basically we can use lv2_in to map out the address and lv2_out to map out the address for where the lv2ldr decryptes the self file.

We can make a program like readself basically and get the offset, u8* means read one byte from the address. use that and we can actually be get the exact offset where it all happens at. once we have the location grabbing this decrypted self should be the easy task. Like I said some info we had and some we did not know about can be obtained like this and used to get keys.

exploiting 4.00 with this method would work most likely because I doubt sony changed all the locations where the loaders do there thing, sure there encapsulated in the bootloader but they still pass over into the ram at one point before being fed over to the metldr which loads ldrs and if all that is still happening then Sony didn't change nothing.. some where along these lines:
[code]
void *buf; //

 

Sponsored Links

Sponsored Links
Sponsored Links

Sponsored Links







Advertising - Affiliates - Contact Us - PS3 Downloads - PS3 Forums - Privacy Statement - Site Rules - Top - © 2015 PlayStation 3 News