Sponsored Links

Sponsored Links

Lv0 Assault Homebrew Application to Find PS3 Keys is Released


Sponsored Links
129w ago - Following up on the previous update, this weekend Spanish PlayStation 3 developer Calantra has released a homebrew application to find PS3 Keys dubbed Lv0 Assault followed by updated versions below.

Download: [Register or Login to view links] / [Register or Login to view links] / [Register or Login to view links] / [Register or Login to view links] (Required)

To quote, roughly translated: LV0 assault is an application that uses the contents of any file type to search for valid cryptographic keys to decrypt files encrypted with keys LV0 metldr * or *.

What it does:

The operation of this program is not based on the use of the techniques of "brute force" is limited to just keep trying all possible keys of 32 bytes that can be found in a file.

We can get:

If by chance the key LV0 appear in theory you could decrypt the file LV0 content updates and versions higher than 3.56 contain changes which in turn contain the long-awaited keys.

That does not do:

  • It is used to decrypt any file type.
  • It serves to create any CFW.
  • There used to play GT5 and to play for PSN.

Notes:

If we find the key delv0 ideally, the most dense file-level data as possible, these files are those that are compressed or encrypted. It is also very useful for finding keys if you have memory dumps from the localstore.

It should be clear that it is extremely difficult and unlikely to get the key LV0 by this method, but it's better than sitting in front of the screen waiting for the prophet down the mountain with the solution to your problems. The more people looking the better.

This program is experimental and is based on a complete utility that I used some time to locate and catalog keys. There are more explanations in the file "readme" that comes with the program and contact addresses.

How to use:

Click on menu "search for" select the lv0 to find lv0 key, metldr to find metldr key.

Thanks to:

Al the ps3devwiki contributors, Team Fail0verflow, Kakarotoks, at all of them for share their knowledges

Last of all, execuse me a lot for my bad english.

Regards, Calantra.




Stay tuned for more PS3 Hacks and PS3 CFW news, follow us on Twitter and be sure to drop by the PS3 Hacks and PS3 Custom Firmware Forums for the latest PlayStation 3 scene updates and homebrew releases!

Comments 201 Comments - Go to Forum Thread »

• Please Register at PS3News.com or Login to make comments on Site News articles. Thanks!

WTF Name's Avatar
#181 - WTF Name - 129w ago
report: using PUP_UNPACKER for 4.0 OFW, and "lv0assault" on lv0 file, "not found"

SanctumSlayer's Avatar
#180 - SanctumSlayer - 129w ago
^ say what?

Cristina's Avatar
#179 - Cristina - 129w ago
Come with CFW 4.00

pinoytechno's Avatar
#178 - pinoytechno - 129w ago
Nice news

enoughbr's Avatar
#177 - enoughbr - 137w ago
I talked with RealPsDev, he says Lv0 can be decrypted, and that he has seen the Lv0 fully decrypted, for those who do not know what it means to Lv0, it is the key "master" keys of all OFW are derived from it.

[Register or Login to view links]
Now before anyone gets to excited this is strings from a hypervision and bootloader dump from the ram it not useless as it tell a lot of events that happen at certain addresses like the lv0 app version is set at 0x10 ect: + It sucks cause a lot of stuff has been cut out due to memory shortage there about 100kb worth of missing info

sys.lv1.emuioif0irq
lv1.ram.tkm
sys.lv1.be
sys.lv1.iosys.errorhandler
sys.lv0.revision
lv1.ram.tkm
be.0.spu.faultbm
sys.platform.mode
sys.cellos.flags
sys.lv1.iosys.pciex
lv1.ram.ioc
quethshld
gglv1.ram.ioc
quethshld
sys.lv0.version
sys.lv1.iosys.pci.retry
lv1.ram.biu
modesetup1
sys.ac.sd
lv1.ram.biu
modesetup2
sys.lc.polling.time
sys.ac.misc2
lv1.ram.spe
lv1.ram.tkm
lv1.ram.tkm
lv1.ram.mic
sys.lv1console.mode
lv1.ram.mic
be.0.fir.mic
be.0.fir.mic
pme.memory.size
@be.0.ioif0.addr
be.0.ioif1.addr
sys.hw.config
sys.sata.param
sys.hw.model
be.0.fir.spu0
be.0.fir.spu1
be.0.fir.spu2
be.0.nclk
be.0.fir.spu0
sys.flash.boot
sys.qaf.qafen
be.0.fir.spu1
@01 2
l7D-!:yP9>
.WPGHshhc
8c
Tc'>hc
8c
I0= 38
p
I0= 58
p
I0= :8
p
xy< yJ A
:axxD"T
/ C@8A
x;ch;!x;
;up9 %p

ordered ID to masking pattern
ordered id %d -> %p

ordered ID to ID

ordered id %d -> %d

0123456789abcdef
0123456789ABCDEF
../../src/UX/selective/secure/certified
file.ccThis is not certified
CF version mismatch

CF category mismatch

incorrect ext
incorrect file
incorrect file
../../src/UX/selective/secure/self64
file: validation of certified
file failed
sys.lv1console.mode
old syscon mode is obsoluted.
ABEND: assertion failed:
????????????????
ABEND: LOG
too many hdec handlers

srr0:
srr1:
dar:
CONFIGURATION ERROR:
logger@:
buffer address:

start pointer:

end pointer:
sys.lv1log.size
loader parameter full
sys.cellos.flags
sys.mmio.map
mu.1.size
be.0.ioif1.addrbe.0.bp
sys.platform.mode
last remainder:
Releasable
allocator@

free list:

free block bitmap:
stockpile@

budget@

residual =

used =

buffer =
sys.lv0.addresssys.lv0.size
sys.lv0.revision
sys.lv0.versionsys.lv1.ahcr
Total memory:

Lv-0 size:

Heap consumption

Peak at:
WARNING: out of memory -
FATAL: no reserved memory...

remaining reserved memory =
lv1.ram.enable
lv1.ram.ppe
lv1.ram.spe
lv1.ram.mic
lv1.ram.mic
lv1.ram.ioc
quethshld
lv1.ram.ioc
quethshld
lv1.ram.tkm
lv1.ram.tkm
lv1.ram.tkm
lv1.ram.tkm
lv1.ram.tkm
lv1.ram.biu
modesetup1
lv1.ram.biu
modesetup2
be.0.spu.faultbm
spurious interrupt: pu
interrupt:
I/O exception: source lv1
runtime.tcl
invalid GOPI number
a conflict is detected
PANIC: conflicting interface number:
revision:
date:
count =
construction
status =

chain =

reversed

link =

rc =
memory leak in heap for thread
is detected.
managed memory:

leak:
memory leak in stockpile for node
is detected.

shortagesegment
association@
, invalidation
count = WARNING: PTE collision
existing=

inserted=
WARNING: PTE collision

existing=
v:
e0:
e1:
ioaddr:
a:
ioid:
sys.pci.share
sys.lv1.iofaultmsg
: write 0x
: read 0x
WARNING: "enable
time" is deprecated

pme.memory.sizepme.memory.size is not a multiple of 4KB
be.0.fir.ras
eebe.0.fir.l2
be.0.fir.l2
be.0.fir.biu
embe.0.fir.biu
eebe.0.fir.ciu
embe.0.fir.ciu
eebe.0.fir.mic
f0be.0.fir.mic
f1be.0.fir.ioc
embe.0.fir.ioc
dump spu
fir regs
unit: spu
DETECT HW Error
unit: global fir, cause: checkstop
DETECT HW Error
unit: global fir, cause: recoverable
recoverable
dump global fir regs
dump biu fir regs
unit: biu
dump l2 fir regs
unit: l2
dump ioc fir regs
unit: ioc
dump mic fir regs
unit: mic
dump ciu fir regs
unit: ciu
sys.lv1.be
sys.hvlog.size
SPE hang is detected: GUID
UNKNOWN, NPC
construction of SPU management VPU failed

pmi
: already called

: wrong gos
sys.lv1.dump
plat.idPANIC: Can't get loader parameter =
sys.flash.fmt
storage.size
spider.gbe0.macaddr.1
spider.gbe0.macaddr.2
spider.gbe0.macaddr.3
sys.debug.device
rsx.rdcy.3
rsx.rdcy.4
rsx.rdcy.5
rsx.rdcy.6
rsx.rdcy.7
rsx.rdcy.8
sys.lv1.iosysenable
ios.net.eurus.lpar
sys.hw.config
sys.hw.model
be.0.nclk
be.0.ioif0.addrlv1.heap.check
The allocation size from the heap
exceeds
bytes: 0x
lc.allow.large
sys.dbgcard.dgbe
sys.lc.polling.time
hypervisor
EIC driver initialization failed
FAIL: construction of a SPU objs
FAIL: Loader parameter 'be.0.spu.faultbm' is required.
sys.cellos.spu.configure
FAIL: Lv-1 does not support system SPEs more than 2.
,normal,system
sys.lv1.iosys.network
sys.hw.config
sys.hw.model
virtual int cellos::iosys::storage::storage
device:ut
cellos::uint64
t, cellos::uint64
t, cellos::uint64
t, cellos::uint64
t, cellos::uint64
t, cellos::uint64
virtual int cellos::iosys::storage::storage
device:ut
cellos::uint64
t, cellos::uint64
t, cellos::uint64
t, cellos::uint64
t, cellos::uint64
t, cellos::uint64
virtual int cellos::iosys::storage::storage
device:ut
cellos::uint64
t, cellos::uint64
t, cellos::uint64
t, cellos::uint64
t, cellos::uint64
t, cellos::uint64
virtual int cellos::iosys::storage::storage
device:ut
cellos::uint64
t, cellos::uint64
t, cellos::uint64
t, cellos::uint64
t, cellos::uint64
t, cellos::uint64
int cellos::iosys::storage::storage
device::confirm
cellos::uint64
XorWithMask
cellos::iosys::storage::storage
initialize
0123456789abcdefghijklmnopqrstuvwxyz
be.0.fir.spu0
be.0.fir.spu0
\\\\ios.net.eurus.lpar

verifier.self
processor.self
processor.self
module.self
verifier.self
module.self
module.self
module.self
module.self
default.spp
kernel.self
init.self
partitions/2
.,/-0.1/2031425364758697:8;9

Sponsored Links

Sponsored Links
Sponsored Links

Sponsored Links







Affiliates - Contact Us - PS3 Downloads - Privacy Statement - Site Rules - Top - © 2014 PlayStation 3 News