97w ago - Following up on the previous update, this weekend Spanish PlayStation 3 developer Calantra has released a homebrew application to find PS3 Keys dubbed Lv0 Assault followed by updated versions below.
To quote, roughly translated: LV0 assault is an application that uses the contents of any file type to search for valid cryptographic keys to decrypt files encrypted with keys LV0 metldr * or *.
What it does:
The operation of this program is not based on the use of the techniques of "brute force" is limited to just keep trying all possible keys of 32 bytes that can be found in a file.
We can get:
If by chance the key LV0 appear in theory you could decrypt the file LV0 content updates and versions higher than 3.56 contain changes which in turn contain the long-awaited keys.
That does not do:
It is used to decrypt any file type.
It serves to create any CFW.
There used to play GT5 and to play for PSN.
If we find the key delv0 ideally, the most dense file-level data as possible, these files are those that are compressed or encrypted. It is also very useful for finding keys if you have memory dumps from the localstore.
It should be clear that it is extremely difficult and unlikely to get the key LV0 by this method, but it's better than sitting in front of the screen waiting for the prophet down the mountain with the solution to your problems. The more people looking the better.
This program is experimental and is based on a complete utility that I used some time to locate and catalog keys. There are more explanations in the file "readme" that comes with the program and contact addresses.
How to use:
Click on menu "search for" select the lv0 to find lv0 key, metldr to find metldr key.
Al the ps3devwiki contributors, Team Fail0verflow, Kakarotoks, at all of them for share their knowledges
Last of all, execuse me a lot for my bad english.
Stay tuned for more PS3 Hacks and PS3 CFW news, follow us on Twitter and be sure to drop by the PS3 Hacks and PS3 Custom Firmware Forums for the latest PlayStation 3 scene updates and homebrew releases!
Following up on the previous PS3 Metldr news update and Guides, this weekend Spanish PlayStation 3 developer DarkVolt has made available dumpmetldr.bin via new PS3 Metldr revision found in PlayStation 3 CECH-2504 consoles (datecode 1b and above) followed by a PS3 Boot Loader SE Version 3.7.3 (lv0 segment) dump and more below.
Download: http://www.multiupload.com/YN4G8LJJK4 / http://pastebin.com/rk7eib9Y / http://www.multiupload.com/SMSLB07LYT (most complete head including)
To quote, roughly translated: Here I come to leave the metldr decryption: http://www.multiupload.com/YN4G8LJJK4 according fence can I go to publish a thing or two more.
Seeks the root key of geohot within the metldr dump I published aver if it sounds the flute.. I am the source and the base is an exploit..
Deneuve image but this time I am not clear. I have work I'll be realeasing more stuff. Saying this is not worthy... hehehe explanation:
We Have a decrypted metldr here, if you see it you will see a little Is An elf Without the normal header. It contains the root keys That geohot publish and a couple of 0x30 addead from 3.50 and ahead, and it STILL USES IT.
HAVING in the elf metldr we can put it the header and upload it in using it as anergistic unselfer for loaders! The metldr is still used in 3.74 (a debug already exists) and 3.73 retail too.
The difference of charge IS that before the metldr used to take the files from CoreOS and now it deliverer LV0 via ram em to us and close the access to the file BUT WE CAN IT DECRYPTED with the keys from the root metldr added if we have the file.
LV0 can be the decrypted if we fix the feat of math to support the bootldr and decrypts the metadata from the header from LV0 and decrypts this with the rest of the spaces with Their loaders.. Worthy is it not? hehe
Edit to add, if you compare a ISOLDR from 3.55 with the metldr you will realize that they are almost the same, I mean the isoldr contains the updates for the metldr (virtual of course)
That in and 3.60 + Also it IS inside of the LV0 so it every time can update the initial metldr boots with the new couple of the keys already have... uploading the metldr in anergistic http://pastie.org/private/2kijry6y7jwoiwsepqqcbq
With Metldr have almost total control of the console as we see in the picture above, however also shows that the bootldr is the only part of the PS3 outside the Metldr, but (and I say this in complete ignorance but using a logic low) and you have full access to the console should be much simpler to access bootldr in any case if this is true it would mean a breakthrough.
erk: C0 CE FE 84 C2 27 F7 5B D0 7A 7E B8 46 50 9F 93 B2 38 E7 70 DA CB 9F F4 A3 88 F8 12 48 2B E2 1B
riv: 47 EE 74 54 E4 77 4C C9 B8 96 0C 7B 59 F4 C1 4D
pub: C2 D4 AA F3 19 35 50 19 AF 99 D4 4E 2B 58 CA 29 25 2C 89 12 3D 11 D6 21 8F 40 B1 38 CA B2 9B 71 01 F3 AE B7 2A 97 50 19
R: 80 6E 07 8F A1 52 97 90 CE 1A AE 02 BA DD 6F AA A6 AF 74 17
n: E1 3A 7E BC 3A CC EB 1C B5 6C C8 60 FC AB DB 6A 04 8C 55 E1
K: BA 90 55 91 68 61 B9 77 ED CB ED 92 00 50 92 F6 6C 7A 3D 8D
Da: C5 B2 BF A1 A4 13 DD 16 F2 6D 31 C0 F2 ED 47 20 DC FB 06 70
PS3 Boot Loader SE Version 3.7.3: http://pastebin.com/rk7eib9Y (lv0 segment) / http://pastebin.com/hJTFRp5P / http://pastebin.com/xkXxk8fM
From by jon_17_: The loads metldr ldr, ldr but these must be authenticated before a hash that contains internally metldr himself. metldr2 comes in certain consoles not downgrade (dataCode 1b and higher) are the most modern consoles today.
Metldr weighs 60KB (usually in some cases), the spu local store have 256KB. The loaders to load the LV0 be decrypted (always), lv1 (always) and lv2 (only in lpar_ps3). Decrypted the loaders themselves LV0, lv1 and lv2.
The lv2 to be deciphered in the lpar_ps3 saved in the spu local_store isolated the idstorage, this stores the hash idstorage of valid executables.