To quote from his site (linked above), roughly translated:
"This program allows to simulate the dev_flash from USB. Allowing a Custom Firmware. We may modify the files of our new dev_flash (USB) as we please, without running the risk of throwing away the PS3.
It is a beta version, probably find bugs. I will continue working on it when time permits me. Remember that suffers no risk to the console. All that is changed the new dev_flash'll be doing really USB.
• Syscall PEEK and POKE.
1. Copy the "FTP server" the entire contents of the / dev_flash the USB (the root).
2. Copy the JaiC_USB_FIRM_LOADER.pkg also the root of the USB.
3. Install the package.
1. Insert the USB into the PS3.
2. Run USB LOADER FIRM. After a few seconds will return to the XMB. The new firmare is loaded.
To quote, roughly translated from Spanish to English: "Well more information from the recent work done by the HadesTeam and Calimba, this time show photos of the connection and also how Windows shows the drive contents PlayStation 3.
JaicraB already returned from his vacation and is back operating on the computer to attack the reader.
As discussed, we work in parallel to exploit Other. We have access to BD reader as if it were one more unit of your PC.
183w ago - It's nice to see Spanish developer JaicraB still plugging away on hacking Sony's PS3 entertainment system, and today he has detailed how to perform his RAM dump method on a 60GB PlayStation 3 console.
Using PS3 Pulse Generator V2, it allows PS3 developers to keep the RAM dumped after rebooting the PlayStation 3 meaning no data loss is present.
This comes shortly after gow3formeshared a relatively larger PS3 OtherOS Exploit Module which seemed to be loaded (the command lsmod showed: exploit 10497032 1 - loading 0x000000000012000 (P+)) but nothing appeared on the video.
To quote, roughly translated: Good. Here you have a minimum base to build the otheros.bld. The BLD takes up 30 Kb and has functions to the HDD with ext2 to save the DUMP. The functions are described.
Call table incorporates LV1 and ASM functions. This ready to assemble the mechanism of the exploit. I hope this helps those concerned who did not know where to start. It has been...
187w ago - Update: An English update of JaicraB's KeyFindPuP application is now available HERE courtesy of kakashigr.
Just over a month ago JaicraB attempted to dump the PS3 Hypervisor LV2 (GameOS) and revealed how it was done, and today he has released a KeyFindPuP application alongside details on their PS3 LV2 dump progress.