To quote: Hi everybody, here to release my new update.
PS3Tools GUI Edition v2.6 Changes:
Added CEX 2 DEX
Fixed PKG decryptor button
Fixed EDAT Tool button
Removed second GUI form
Minor bug fixes and code changes to perform better
I have been asked a lot recently to add in a debug PKG decryptor because all I had is a Retail decryptor & extractor. Well I did, but last minute checks, I noticed it was not performing the way I wanted it too.
So instead of releasing faulty code/tool on my program and say it works half way, I'd rather withdraw the feature until a further update when I can have it working properly to my standards and what should be most.
PlayStation 3 CEX to DEX:
This whole CEX to DEX is going around, I felt like adding it to GUI form had to be done so, I jumped on band wagon and did it. When going to use this Make sure you have a CEX Nor flashed named "CEXFLASH.bin" and the eid_root_key.bin in the program folder.
Run the tool and it will output a DEXFLASH.bin... easy as pie. Note* opensll required!!
Thanks to naehrwert, KaKaRoToKS, andbey0nd Math, HsRiena, geohot, eussNL, zecoxao and ofcourse the MAIN team I cannot forgot. Fail0verFlow also tthousand for always helping with everything, you're awesome buddy I never give you enough appreciation and thanks!!
Finally, from Sony PS3 hacker evilsperm:
I will not be going into detail on how to compile the metldrpwn or how to compile and use libeeid. Oh and if you don't know what scp is go google it because im not gonna be getting into all that, this isnt a spoon feeding tut
1. dump nor (from xmb, hardware flasher, or petitboot) if from petitboot you will need a flash drive or external hdd. make sure you hold on to this backup or your FUCT if something goes wrong.
2. extract nor (f0f tools or the windows nor unpack)
3. install rebug otheros++
4. install rebug otheros++ preptools
5. boot into petitboot
Now this is where it will start to get tricky because you will need to either scp files or use a flashdrive/external hdd, I use scp because its fast and easy
6. READ eEID : dd if=/dev/ps3nflasha skip=$((0x2F000)) of=/cex_eid.bin bs=1 count=$((0x10000))
7. scp cex_eid.bin to your computer
8. cd / rm cex_eid.bin
8. scp your metldr to the PS3 from your computer
9. run the metldrpwn on your metldr and dump the eid_root_key
10. scp your eid_root_key from your PS3 to your computer
11. use libeeid or whatever that other cex>dex tool is and convert your eid to dex (using the cex_eid.bin > dex_eid.bin)
12. scp your new dex_eid.bin to the PS3
13. WRITE eEID: dd if=dex_eid.bin of=/dev/ps3nflasha bs=1 seek=$((0x2F000)) count=$((0x10000))
15. if you're not bricked you will still be in cex FW just install DEX fw and poof your done
LAST WORDS OF WARNING:
If you brick its 100% you're fault and you didn't follow the instructions the the letter, or you just did something wrong all together. Don't ask me what went wrong cuz I won't have a clue nor do I care if you brick seeing I warned you to have a hardware flasher just in case.
Sorry if that sounds harsh but if you don't think you can do this then you shouldn't be trying to mess with your nor in the first place because YOU CAN PERM BRICK!
Rename the .bin's for use with this gui...
Note: After booting to gameOS from petitboot (just after writing the nor, which only a very small section is actually changed) it is still booting the cex firmware that is installed. It isn't on debug fw yet, so there are no debug options. All this does is allow you to install a debug firmware.
Stay tuned for more PS3 Hacks and PS3 CFW news, follow us on Twitter and be sure to drop by the PS3 Hacks and PS3 Custom Firmware Forums for the latest PlayStation 3 scene updates and homebrew releases!
Following up on his previous release, this weekend PlayStation 3 developer PsDev has updated PS3Tools GUI Edition to version 2.0 which now incorporates the PS3 EDAT Tools with the complete changelog detailed below.
To quote: I collaborated now listen, PsDev back with the brand new edition. Yes, yes. Me and SnowyDew have collaborated and I added his magnificant tools to mine It was a struggle getting it to execute properly, but I finally got rid of all the errors and combined them for the best experience.
Changes, Decrypt and Re-encrypt edat's successfully
Decrypt eboot.pbp's / eboot.bins for further game modifiying
Decryption of act.dat and rif keys
Print coreos image info
Snowydew: so the decryption as it stands right now, an do iso.bin.edat, requires idps, rif and act.dat for the games. re-encryption i believe it needs the “fake” signed ones, as well as an idps (not sure on the idps) however the second method only requires the idps and the .rap file. this does not cover licenseing games i believe (It could, but we haven’t tested it) the re-encryption algo is in the encryption one, but again haven’t been able to test it completely (reason I was asking around on twitter awhile back)
Thanks to naehwert, snowydew, KaKaRoToKS, geohot, math and any one else I forgot.
Finally, in related news today belioc has leaked what he claims are some PlayStation 3 Lv0 Opcodes (below) and has credited PsDev for them, as stated below:
Although I am leaking this, I am still gonna give credit to who got these, that is PsDev. OpCodes (Operation codes) are the operation to be performed in a instruction set of the processor.
Here are the lv0 operation codes. A lot are unknown so it's really hard to say what function they're doing, but the function offset is provided. When I recieved the file it has about 10MB of NOP (No operation performed) about 1MB of operations being performed.
Shortly afterwards, PsDev stated the following rebuttal though: Lol this is false, me and naehwert talked it over the opcodes are just a reading that is false due to the lv0 being encrypted. the BL is what decrypt the lv0. How would I dissemble a encrypted lv0?
Haha last time I share something that could have potential (it don't) with someone.
Just run the lv0 in a DisArm decoder (don't have to be DisArm) it will bot the self and tell the opcodes (that are false).