Sponsored Links

Sponsored Links

PS3Tools GUI Edition v3.0 - PS3 SPU, Debug PKG & SELF Decryption


Sponsored Links
118w ago - Shortly following his last release, today PlayStation 3 developer PsDev has now updated PS3Tools GUI Edition to version 3.0 which now adds PS3 SPU emulation, SELF decryption and Debug PKG decryption as detailed below.

Download: [Register or Login to view links]

To quote: Hi everyone, here with a new update to my program. Added SPU Emulation, Self Decryption and debug pkg decryption. Along with more accurate loading bars and a interface change to pkg tool, spu emulation, self decryption, edat tool.

  • SPU emulation added
  • Debug PKG decryption added
  • SELF decryption added
  • Logging Errors/successes added to EDAT tool
  • Logging Errors/succession added to PKG tool
  • Loading bars code adjustment, more accurate now

Originally by KDSBest, SPU emulation has been incorporated in my GUI. It was quite easy, we both coded our programs in C# (Sharp) so I didn't really have much trouble.

Self decryption is know possible. Just browse for your self/bin file and hit decrypt or, drag and drop. Yes I added it.

Now Debug PKG decryption is a option too, just name the file debugpkg.pkg put in root of program folder and run the tool and it decrypts.




Stay tuned for more PS3 Hacks and PS3 CFW news, follow us on Twitter and be sure to drop by the PS3 Hacks and PS3 Custom Firmware Forums for the latest PlayStation 3 scene updates and homebrew releases!

Comments 49 Comments - Go to Forum Thread »

• Please Register at PS3News.com or Login to make comments on Site News articles. Thanks!

enoughbr's Avatar
#19 - enoughbr - 143w ago
Developer PsDev is back again today with another article (psx-scene.com/forums/content/possible-1885/) for everyone to read and enjoy. This time, the topic revolves around a possible PS3 4.0 exploit, and the theory around it. This is information that he would like to share with the scene, in hopes of change and overcoming the current barriers to jailbreaking the PS3 console. Feedback welcomed, as PsDev has put a lot of thought and time into this theory.

OK so lets get right to it. This is a theory, nothing more.

There has been information available for quite some time. and I took it, thought about it, researched and experimented and I come out with my theory below to exploit 4.00 part of the way. This is not a random theory to, this is logical stuff and true facts. I'm providing this info for other devs to look at and lets see if this can work. I don't keep my work to my self, I like to share in give other people chances in discovering stuff. It always makes me happy when someone finds something out using my work, it just tells me I did a good job in describing and helping and they did a good job in listening and learning the material in order to trigger the exploit or whatever it might be.

So the lv2ldr verifys decrypts the lv2_kernal.self. we can get the address of this happening. inside Parameters Layout there are arguments, they are used as commands basically to load a function you want to use. they start in the lv2 @ 0x3E800(seems to be same for other ldrs) that address. There is a argument that is called lv2_in and lv2_out (we have know about these) basically we can use lv2_in to map out the address and lv2_out to map out the address for where the lv2ldr decryptes the self file.

We can make a program like readself basically and get the offset, u8* means read one byte from the address. use that and we can actually be get the exact offset where it all happens at. once we have the location grabbing this decrypted self should be the easy task. Like I said some info we had and some we did not know about can be obtained like this and used to get keys.

exploiting 4.00 with this method would work most likely because I doubt sony changed all the locations where the loaders do there thing, sure there encapsulated in the bootloader but they still pass over into the ram at one point before being fed over to the metldr which loads ldrs and if all that is still happening then Sony didn't change nothing.. some where along these lines:
[code]
void *buf; //

PS3 News's Avatar
#18 - PS3 News - 150w ago
I figured as much based on what I've read thus far, but Thanks for the confirmation Tidusnake666 and +Rep!

Tidusnake666's Avatar
#17 - Tidusnake666 - 150w ago
Yep Boss, it's a generic encrypter, there are tons of these around net, nothing PS3-specific here.

PS3 News's Avatar
#16 - PS3 News - 150w ago
As this is our current thread for PsDev developments I will leave this here for the moment... it appears to be a generic file decrypter/encrypter and not anything PS3-specific so I won't mainpage it, but those who want to check it out can do so.

Download: [Register or Login to view links] / [Register or Login to view links] (required)

Below are the details from the ReadMe file via psx-scene.com/forums/content/crypter-tools-released-1743/:

This can package of tools can encrypt and decrypt any file type, you can use you own key so no one can decrypt it. Unless they know the key.

The USAGE:

Encrypter:

[Register or Login to view code]


Decrypter:

[Register or Login to view code]


Note -- if the file has and extension on it ex: example.txt, you must add the .txt.

The Decrypter will say it was decrypted succesfully but if you did not enter the right key you will get a file damage error.

barrybarryk's Avatar
#15 - barrybarryk - 151w ago
Yeah Math is holding his hand though so you can be pretty sure that won't lead anywhere.

Sponsored Links

Sponsored Links
Sponsored Links

Sponsored Links







Advertising - Affiliates - Contact Us - PS3 Downloads - Privacy Statement - Site Rules - Top - © 2014 PlayStation 3 News