Sponsored Links

Sponsored Links

PS3 SCETool v0.2.5 by Naehrwert Out, Uses Metadata for Decryption


Sponsored Links
128w ago - Following up on his previous revision, today PlayStation 3 developer naehrwert has updated PS3 SCETool v0.2.5 which utilizes metadata information for decryption among the changes outlined below.

Download: [Register or Login to view links] / [Register or Login to view links] (Required)

scetool 0.2.5 public build (C) 2011-2012 by naehrwert

Setup:

  • /data/keys : Keyfile.
  • /data/ldr_curves : Loader curves (7744 bytes).
  • /data/vsh_curves : VSH curves (360 bytes).

Keyfile format:

Keyset example:

NPDRM key(set) names:

  • [NP_tid]: Title ID OMAC1 key.
  • [NP_ci]: Control info OMAC1 key.
  • [NP_klic_free]: Free klicensee.
  • [NP_klic_key]: Klicensee key.
  • [NP_sig]: Footer signature ECDSA keyset.

Help text:

History:

Version 0.2.5:

  • Added option to use provided metadata info for decryption.
  • "PS3" path environment variable will now be searched for keys/ldr_curves/vsh_curves too.
    Version 0.2.4:
  • Added option to display raw values.
  • Moved factory Auth-IDs to (as they are on ps3devwiki now).

Version 0.2.2:

  • Added options to override control/capability flags (32 bytes each).
  • Fixed where a false keyset would crash scetool when decrypting a file.
  • Some source level changes and optimizations.

Version 0.2.1:

  • zlib is required to use scetool.
  • 'sdk_type' was changed to 'revision' in data/keys.

Greetings to: you know who you are!




Stay tuned for more PS3 Hacks and PS3 CFW news, follow us on Twitter and be sure to drop by the PS3 Hacks and PS3 Custom Firmware Forums for the latest PlayStation 3 scene updates and homebrew releases!

Comments 234 Comments - Go to Forum Thread »

• Please Register at PS3News.com or Login to make comments on Site News articles. Thanks!

technodon's Avatar
#44 - technodon - 102w ago
basically a payload like the one used in the 3.41 jailbreak (hermes) is loaded into stack overflow when the ps3 tries to read this the payload is loaded into memory and you get unsigned code execution. but the problem is that ps3 is using the stack and it copies something to it instead of reading first.

so the payload which has been loaded there is being over written before it has been read and is deleted so if you could somehow make the ps3 read from stack or load the payload just before the stack gets read the payload would be loaded and you have a new jailbreak.

JOshISPoser's Avatar
#43 - JOshISPoser - 102w ago
i'm understanding it a bit more. the higher the lvl, the more security breaches needed because it'll allow it to be more open?

CJPC's Avatar
#42 - CJPC - 102w ago
Generally, assuming that there is already a user mode exploit (think an exploit in a game), using this exploit will allow you to elevate permission to kernel level. The simplest way to think about it is the PSP exploits, and how multiple exploits were needed. Generally, of course!

JOshISPoser's Avatar
#41 - JOshISPoser - 102w ago
if that was to me, it doesn't make sense.

eh, whatever. i know it's not exactly for me, i was just wondering the possibilities but i'm guessing it's not something easily explained in a sentence or two in laymen terms.

xrayglasses's Avatar
#40 - xrayglasses - 102w ago
You don't need a lv1 exploit, it can glitch HTAB..

Sponsored Links

Sponsored Links
Sponsored Links

Sponsored Links







Affiliates - Contact Us - PS3 Downloads - Privacy Statement - Site Rules - Top - © 2014 PlayStation 3 News