Sponsored Links

Sponsored Links

 

Sony Bans PSJailBreak PS3 ModChip Sales in Europe

650°
198w ago - According to Gamersmint.com (linked above), Sony has now succeeded in banning sales of the PSJailBreak PS3 modchip USB device in Europe.

This news comes just days after document leaks and UKIE support for Sony's swift legal action were announced.

To quote: "Sony has finally succeeded in banning the selling of the modchip in Europe.

After releasing a security firmware update which made the PSJailbreak useless, Sony has gone 1up now and the Japanese manufacturer has cut the grass from under the feet of prospective hackers through an order which makes it illegal to sell the modchip and all its clones in Europe.

This news has been confirmed by [Register or Login to view links], one of the leading modchip online retailers who have taken off their stock of the PSJailbreak from their website following this recent order.

Friday, October 8, 2010 · Prohibition to sell PS Jailbreak and its clones. PS jailbreak and similar products have been withdrawn from stock. All orders will continue to receive full support."
 

PS3JB - PS3 JailBreak for TI-84 Plus and TI-84 Plus Silver Edition

1000°
199w ago - Today BrandonW has updated PS3JB, a PS3 JailBreak for the TI-84 Plus and TI-84 Plus Silver Edition calculators, to version 0.05.0001 followed shortly by PS3JB 0.06.0001.

Download: PS3JB 0.05.0001 / To8XV (To Add Payloads) / PS3JB 0.06.0001 / PS3JB 0.06.0001 (BDEmu Enabled)

In addition to loading external payloads, support for Marcan's PS3 Linux bootloader recently named AsbestOS is included in the update.

To quote: This is a FLASH application for the TI-84 Plus and TI-84 Plus Silver Edition that implements the PSGroove exploit for the Playstation 3 console.

By connecting a USB cable between a PS3 and your calculator and running the application, you can trigger the PSGroove exploit from your graphing calculator.

v0.05.0001 changelog:

• Added Install/Uninstall options for jailbreak hook, enabling use within the TI-OS and outside the application...
 

Sony Targets PS JailBreak, PSFreedom and PSGroove PS3 Hacks

1150°
200w ago - Today garyopa at PSX-Scene.com (linked above) reports that Sony appears to be targeting the PS JailBreak, PSFreedom and PSGroove related PS3 hacks and has shared numerous court documents for those interested.

From one of the documents, to quote: "Similarly targeted document subpoenas or deposition notices to any other third party who SCEA learns may be involved in the distribution or sale of the PS Jailbreak software, known as, for example, PSGroove, OpenPSJailbreak, and PSFreedom, or who may have knowledge of the distribution or sale of this illicit software."

PS3 hacker Mathieulh is also mentioned in one of the documents as recently [Register or Login to view links] to be one of 20 individuals behind PSGroove, to quote: "Mathieu Hervais told BBC News he was one of about 20 hackers involved in PSGroove's development."

Just under a month ago Sony was granted an injunction by Australian Courts on the sale of PSJailBreak PS3 modchips, followed by blocking PS JailBreak and PS3 proxy...
 

PSGroove Modified for PS3 Backups Without a Disc in the Drive!

1300°
200w ago - Today Spanish PS3 developer Hermes at Elotrolado.net (linked above) has shared a modified payload version of PSGroove, which allows users to run PS3 backups without requiring a disc in the PlayStation 3 drive.

Download: [Register or Login to view links]

To quote, roughly translated: Taking advantage that I have my AT90USBKEY, I used the disassembly of the payload (made by me), the descriptions in ps3wiki.lan.st and part of AerialX source, with the following objective:

1) Have a damn once the source of the exploit, with amendments, etc, enough is enough for us to pass an array and pulling miles.

2) I used to make some changes, with a very interesting result.

The first thing to tell, is that the payload is loaded into a memory area (700 000) and ends up turning part of your code into an area that is too full. Just add four things we can and in fact, for my change I had to relocate a table with patches (do not think you are having problems in the position you are).

The second is that I managed to enable loading of backups with the amendment introduced AerialX by his side, in order to launch applications from a flash drive (HDD) attached on / dev_usb000 (of the four ports, which...
 

PSJailBreak PS3 Exploit Payload Reverse Engineering Detailed

1000°
201w ago - A few weeks back we reported on the PS JailBreak PS3 exploit reverse engineering followed by the PSJailBreak PS3 exploit payload, and today naehrwert has focused on the PSJailBreak payload itself, as follows:

PSJailbreak Payload Reverse Engineering

Here's my understanding of what the exploit playload does:

1. it gets control at exploit_entry, which copies the rest of the payload to the fixed address 0x8000000000700000 and jumps to exploit_main.

2. exploit_main copies a resident part of the payload to another location, creates virutal usb device driver called "mod" with 3 functions, hooks some vsh functions via toc entry and does some permanent in-ram patching. when the work is done it zeroes itself out.

3. the resident part has basically 3 purposes: it manages virtual usb device, it does some on-the-fly patching and it hooks all the game disk file accesses from the vsh.

a. the virtual usb device is needed to make sure the original ps3jb device in plugged in. once the correct device is plugged (the one with the AAAAC0DE) device...
 
Sponsored Links

Sponsored Links
Sponsored Links

Sponsored Links






Affiliates - Contact Us - PS3 Downloads - Privacy Statement - Site Rules - Top - © 2014 PlayStation 3 News