Sponsored Links

Sponsored Links

JTag Port on PS3 Blu-ray Drive Board Located and Mapped

Sponsored Links
271w ago - Developers at DemonHades have located and mapped the JTag Port on a PS3 Blu-ray drive board today.

To quote, roughly translated: I found the JTag port for the Blu-ray Reader on the PlayStation 3. Last night after finishing the research meeting I went looking for information about BD integrated reader.

In and looking at the information that I found on the back of the plate reader I saw that there is no connector terminals, these terminals belong to a connector which connects 'something' via terminals and through the Internet I found the points used in a JTag, including the TDO, TDI, TMS etc.

Originally developed for printed circuit boards, it is currently used for test of submodules of integrated circuits, and is also useful as a mechanism for debugging embedded applications, as it provides a backdoor to within the system.

When used as a debugging tool, an in-circuit emulator that uses JTag as the transport mechanism allows the programmer to access the debugging module that is integrated into the CPU. The debug module enables the programmer to correct their errors and code logic of their systems.

There are consumer products that have a JTag port integrated, so that the connections are often available on the PCB as part of the prototype phase of the product. These connections can provide a simple way to reverse-engineer.

As you can see we have a door strike to try to get the firmware, decrypted data, and all that is able to control the Blu-ray reader.

The data from this integrated JTag will CXD5063GG-1. CXD5063GG-1 = ASIC / CPU - Video Decryption Device Sony Computer Entertainment Inc., CXD5063GG-1, 2005 SCEI, 120,748 0608HAL.

Stay tuned for more PS3 Hacks and PS3 CFW news, follow us on Twitter, Facebook and be sure to drop by the PS3 Hacks and PS3 Custom Firmware Forums for the latest PlayStation 3 scene and PlayStation 4 scene updates and fresh homebrew releases!

Comments 50 Comments - Go to Forum Thread »

• Please Register at PS3News.com or Login to make comments on Site News articles.
#45 - PS3 News - 270w ago
PS3 News's Avatar
Quote Originally Posted by jabberosx View Post
Actually I too remember that. And not only that but Made Man suggesting that one of the dev's was writing the code and requesting the community to help. whatever happened of that idea.

The PS3 KeyVault Project was shelved by the Project Leaders... as I replied in an old post (HERE) they basically found more direct paths to what they were trying to accomplish at the time.

In one of CJPC's PS3 Dev articles (HERE) he posted the corrected estimate of how long it would take to bruteforce the Retail PS3 Decryption Key, and due to an initial gross miscalculation by one of the Lead Devs it ended up being longer than anyone here will be on earth.

Precisely, he also wrote a brute forcer for the same kind of key for XBox 360 and got it up to 2 million keys/second, and worked out it would *only* take 5395141535403007094485264.577495 years to guess it.

Even if we got 1 million people working on it full time, you could only divide that number by 1,000,000 so still a HUGE number indeed.

#44 - cfwprophet - 270w ago
cfwprophet's Avatar
Im sure pplz would do it but the only way this could work would be over a cluster system like F@H or S@H or to use a PS3 Cluster with 200-300 consoles to hack the PS3 encryption by the PS3 itself.

I mean to hack the BD Drive/FW is useless.Even if CJPC and the xboxhacker community will be wrong about the jtag port of the bd drive (what i doubt) and the demonhades dev's can dump the bd fw they would need to crack the 256bit encryption and also to change the bd fw in the ps3's fw itself.

Let me say it in the words of Bushing: So much fail...

#43 - jabberosx - 270w ago
jabberosx's Avatar
Actually I too remember that. And not only that but Made Man suggesting that one of the dev's was writing the code and requesting the community to help. whatever happened of that idea. I am pretty sure more than enough people will offer their excess computing power for this good of the community. i know I will

#42 - semitope - 270w ago
semitope's Avatar
I Liked my idea better. Ski masks and Bebe guns (or was it shotguns? )

I really hate the idea of buying something with so much encryption. At which point is the hardware mine? Anyway, good job with the info so far.

I am not sure i got an answer about using distributed computing to hack these encrypted files. Asked long long ago. Is it not at all possible?

#41 - SCE - 270w ago
SCE's Avatar
Quote Originally Posted by CJPC View Post
Well - the post really isn't too clear - but the thing w/ JTAG lines, it requires multiple lines. If even just the right one is blown it will never work, sadly. Some clever people have gotten around this with other embedded devices by rewriting FW to allow output over a UART - but the catch was that the FW wasn't encrypted!

We can all hope that it does work, but in all of our tests - the JTAG was blown.

One must force Sony to release the code of BD FW in the court

Convince the adjudicator


Sponsored Links

Sponsored Links
Sponsored Links

Sponsored Links

Advertising - Affiliates - Contact Us - PS3 Downloads - Privacy Statement - Site Rules - Top - © 2015 PlayStation 3 News