304w ago - Mainman has updated his PS3 NAND Extractor/UnPacker to v0.4 recently! Changes to the latest revision include support for multiple dumps. The NAND Tool now scans for files, versus using a fixed position making it much more robust with extracting files.
It includes BETA support for the 40gb PlayStation 3 flash, however, we are still working out a few major bugs prior to a public release.
As mentioned above, extraction now dumps the files, plus additional data including the IDL section. It extracts the MAC Address, and also dumps the asecure loader section. More on this soon..
In other news, we are waiting for the InFeCtuS Team to update their program to support the new Samsung Flash revision, so we can experiment more with our recently discovered PS3 downgrading technique. Until then, not much new to report on this area yet.
Finally, we have been successful with running PS3 Retail game back-ups on a PS3 Test from both Internal and USB HDD (along with DVD). Unlike PS2 and PS1 development systems, a PS3 Test won't play a 1:1 copy/scene release.
It only plays development copies, so the executables (EBOOT.BIN) had to be decrypted and rebuilt for them to load. However, as mentioned previously,...
It comes with a Windows and Linux binary as well as source code, and those without an Infectus Mod can still experiment with it using the following 'dumpable dumps' files (via PS3 Infectus) available in iRC EFnet #PS3News when merged:
From the ReadMe file: This tool is used to interleave, then byteswaps both dumps of the PS3 NAND. Upon completion, it creates a 'user readable' file.
This file is then scanned by the tool, and the flash files are extracted to a folder. This folder is named PS3Nand-XXX.XXXX, where XXX.XXXX is the SDK Version magic in the flash (usually the version number of the firmware)
.B .A usually works, however in some cases .A .B order is required.
312w ago - Over the past few weeks, mainman has been working on a tool, with the assistance of our other PS3 Devs. This tool creates user-readable files from the PS3 flash dumps.
PS3's have two flashes, the firmware is spanned across both ot them. On boot they are interleaved and byte swapped. This tool recreates the process which interleaves and byte swaps the flashes.
This tool then creates a folder named PS3Nand-XXX.XXXX, where XXX.XXXX is the contents of "sdk_version", which is a file that stores the firmware revision of the PS3.
Upon completing that, the tool extracts every file from the flash, into said folder. Alas, all of the files (list below) are encrypted, but they are interesting nevertheless.
However if a PS3 was upgraded, it keeps a copy of the older flash as well. Say you are on 1.50, and upgrade to 1.60, it keeps 1.50 on there, and adds 1.60. The second firmware in this case, is not dumped (yet).
There are still a few bugs, it does not extract both firmware versions on a PS3, like the previous mentioned case. It also searches as a start for a fixed position, so it may not work with all dumps. We have had the most success with Infectus dumps, which you can get at Hardstore.