158w ago - A few weeks back graf_chokoloannounced that he decrypted PS3 Firmware 3.50 and work on a free public PS3 Downgrader was underway, followed by a PSGroove Payload update to decrypt PKGs from PlayStation 3 PUP Files with today's update including the OtherOS.self and Lv2diag.self from a PS3 Service JIG decrypted!
To quote via xorloser's blog, linked above, on the PS3 appldr interface reversal progress:
graf_chokolo says: Guys, i know you are waiting for the USB Dongle Master Key from me I have got now 2 fat PS3 with HV 3.15 but unfortunately no SX28 development board yet to exploit it
But i was not idle and the last and this week i was working on reversing of self decryption. And now i'm able to decrypt SELFs and SPRXs on my exploited GameOS by using HV calls only and no GameOS functions at all I reversed the interface to appldr which decrypts SELFs on GameOS 3.41.
So you won't get bored until i get the USB Dongle Master Key, i will make my findings and my source code public very soon and you will be able to decrypt your favourite games and programs by yourself :-) Let the fun begin, guys
Here is a "small" teaser of decrypted Lv2diag.self from service JIG
You cannot decrypt isolated SPUs with appldr, i think, because they are decrypted by isoldr.
I'm able to decrypt hdd_copy.self from 3.42 but not from 3.50
Stay tuned for more PS3 Hacks and PS3 CFW news, follow us on Twitter and be sure to drop by the PS3 Hacks and PS3 Custom Firmware Forums for the latest PlayStation 3 scene updates and homebrew releases!
That's why the SX28 board is needed to glitch the bus & dump the LV1.
Just a quicky to everyone - could I modify a PIC 18F2455 circuit to produce the pulses needed for the glitch attack? I remember reading something about shorting 2 of the output pins on the IC to get the clock pulses.
Any ideas? I could knock one up & get it posted to him in the next 24 Hours.