206w ago - Today we have a brief update on the PS3 TOOL DECR-1000A serial port, as I haven't had time yet (due to the holidays) to install my Infectus Mod into our Service Mode PS3 to begin dumping and comparing the NAND images.
Not long ago we took a peek at the PS3 Reference Tool's serial port, which is a 9 pin RS-232 port is covered by a metal panel, with two screws holding it down. One would assume there are secrets behind it, we did!
On connecting to the unit, we received a prompt for a password. On a whim, we tried a few default passwords, one of which being Administrator, and it worked!
We then received the prompt shown in the picture (below). Alas, there are only a few options to set the IP address on the unit. It can either be set statically, or dynamically - letting the IP be obtained by a network DHCP server.
The version command returns the software version of the PS3 Communication Processor, which as we detailed previously, is the embedded debugger in the PS3 TOOL.
The IP settings as well are that of the embedded debugger. Luckily, it appears to be a simple script running on a Linux system.
That said, if we can manage to break out of the script, we would get access to the entire PS3 Communication Processor and be able to dump it!
Stay tuned for more PS3 Hacks and PS3 CFW news, follow us on Twitter and be sure to drop by the PS3 Hacks and PS3 Custom Firmware Forums for the latest PlayStation 3 scene updates and homebrew releases!
Once again BIG props to all of the PS3 Devs here, and let's keep our fingers crossed on this as well!
PS: I know the next few weeks should be less "hectic" for you since classes are out and the holidays are almost over, so don't forget about that "PS3 TOOL XMB Tour" you also said you'd give those of us who don't have one!