Sponsored Links

Sponsored Links

PlayStation 3 Service Mode JIG Set-Up Files Leaked!


Sponsored Links
298w ago - Recently some [Register or Login to view links] JIG set-up files have been leaked, and we're told by someone close that the actual source of the leak is infact the leaker who goes by the nickname of hackerpointer. Apparently he is the same source of [Register or Login to view links] leaked screenshot back in November of last year.

In any case, those who want to grab them can do so below, however, don't expect it to lead anywhere (remember: they are "old" files to PS3 Devs, meaning this is indeed "old news" just new to the general public).

Download: [Register or Login to view links] / [Register or Login to view links] / [Register or Login to view links] / [Register or Login to view links]

As it's already making it's rounds on the Internet, we hesitantly decided to post on it... even though those who can actually utilize the files (and attempt to replicate the required hardware) have had them for quite some time.

Here is some background on what the included files are for those new to the PS3 Dev world...

Lv2diag.self: crashes on a Debug console, likely used for lv2 diagnostics.

PS3UPDAT.PUP: a very tiny updater PUP, enough for just a 'base' system. It doesn't run on any system the resident PS3 Devs currently have access to.

UPDATER_LOG.TXT: simply a service mode updater log.

That being said, in general such leaks are frowned upon as they put the source in jeopardy... however, since the source happens to be the leaker in this case there isn't much that can be done unfortunately. If they choose to leak such files taking any associated risk, that is their own perogative... even though it defies rational logic, unless the leaker removed all traces/watermarks of course.

Feel free to discuss the files below, but without the hardware, additional files with complete documentation, and the required software this leak is deemed as no legitimate use to date.



Stay tuned for more PS3 Hacks and PS3 CFW news, follow us on Twitter and be sure to drop by the PS3 Hacks and PS3 Custom Firmware Forums for the latest PlayStation 3 scene updates and homebrew releases!

Comments 30 Comments - Go to Forum Thread »

• Please Register at PS3News.com or Login to make comments on Site News articles. Thanks!

Beast's Avatar
#15 - Beast - 293w ago
Quote Originally Posted by RMX View Post
Reliable USB dongles don't send just a single packet of data to make an application sure the dongle is sane. There are special custom protocols to validate such dongles by sending an arbitrary data and receiving proper responses. But it's still possible the JIG dongle isn't so secure.

ok, for basic, the system file of usb dongle is knowledge ? (FAT, NTFS, EXT, ...) and maybe files leaked contains some protocol but not complete, to complete it, the usb may be insert to a retail console to work. maybe a special eprom is used in this jig, maybe... thanks RMX for precisions

with many search, i think to a possibility: a usb key programmable where someone can put some file in a eprom maybe a good possibility. i have see a product called goldkey and i think i can check this possibility later. before, i see if other usb key programmable exist and choose one closer of my idea.


Edit: after see the leaked file, i'm now sure about something: one condition is to know exactly the file structure but impossible to know who is it. the leaked jig is not complet (but not sure about it).. if the team who have make the leak can send a message of full list txt to know better about this

thanks

RMX's Avatar
#14 - RMX - 294w ago
Quote Originally Posted by Beast View Post
i think a possibility to signed usb (for example : a sound software called CUBASE use usb key for authentification)

maybe it's possible to find a way to make a connection between dongle usb and retail console to copy packet and find what is the key

just a supposition

Reliable USB dongles don't send just a single packet of data to make an application sure the dongle is sane. There are special custom protocols to validate such dongles by sending an arbitrary data and receiving proper responses. But it's still possible the JIG dongle isn't so secure.

Beast's Avatar
#13 - Beast - 294w ago
Quote Originally Posted by RMX View Post
It looks like it's impossible to make this kit run on a retail machine since a special USB dongle is required to boot the update file. However the dongle is probably just a flash drive with some specific feature(s). PS3 is so secure system so I can expect it will be difficult to clone the dongle while I remember those USB dongle for PS2 demo stands which are apparently just a dummy devices with the specific Vendor ID & Product ID.

i think a possibility to signed usb (for example : a sound software called CUBASE use usb key for authentification)

maybe it's possible to find a way to make a connection between dongle usb and retail console to copy packet and find what is the key

just a supposition

RMX's Avatar
#12 - RMX - 294w ago
Quote Originally Posted by Beast View Post
question => someone have make test on a retail ?

It looks like it's impossible to make this kit run on a retail machine since a special USB dongle is required to boot the update file. However the dongle is probably just a flash drive with some specific feature(s). PS3 is so secure system so I can expect it will be difficult to clone the dongle while I remember those USB dongle for PS2 demo stands which are apparently just a dummy devices with the specific Vendor ID & Product ID.

Beast's Avatar
#11 - Beast - 294w ago
ok, a kind of pandora for restore kit..

question => someone have make test on a retail ?
other question => files are signed ?

i will see that when i have time

Sponsored Links

Sponsored Links
Sponsored Links

Sponsored Links







Advertising - Affiliates - Contact Us - PS3 Downloads - Privacy Statement - Site Rules - Top - © 2014 PlayStation 3 News