Sponsored Links

Sponsored Links

 

PS3 Eboot Dumper Preview and MEMore!

200°
361w ago - A quick update tonight with a few more details about the upcoming Eboot.bin Dumper utility. It dumps the Eboot.bin from your original PS3 Game disc, and strips the disc layer of encryption, so it is a less-encrypted SELF.

The program is simple to use: first install the package to a TEST/TOOL PS3. Then insert a memory stick in the PS3 and run the program. Upon completion, remove the memory stick and read it in a PC.

You now have an EBOOT.BIN that is void of the disc layer of encryption! There are still a few add-ons that can be made such as dumping to a PC, however that may be done down the road. Below is a picture of the BETA version of the XMB info screen for the utility.

Furthermore, we have noticed it's a bit easier to dump some of the system memory via GDB than our own custom code.

Why? Well check back on that, but we have already found a decrypted sprx in memory, and that was only after a few seconds of looking.. so some good things are to come soon!
 

Impaler PSX eBoot Creator for PSP released!

50°
364w ago - Impaler has released a PSOne EBOOT creator dubbed ImpalerPSX.

The application includes a GUI and supports the latest POPStation version to simplify creating single and multi-disc PSOne EBOOTs.

Download: Impaler PSX eBoot Creator for PSP

New to this release is a preview option and a global output window designed for error handling.
 

Revised PS3 Boot Information

250°
366w ago - Our Resident DEVS have revised the PS3 Bootup procedure, with some more interesting information.

asecure_loader is not at start of the NAND. The first 512KB also is skipped, or actually any 512 block of FF is skipped.

Furthermore, the asecure_loader differs per box, possibly encrypted with a per-box key. Files of course are not in clear, that suggests that at every step an encryption/decryption is done.

The boot loader in IDA does not look microcode for IDL, maybe it's encrypted with cpu key (the IBM secure boot/asecure_loader), that can explain also why a NAND dump can be restored only on the PS3 from which it was taken.

asecure_loader ----> lv0 which start lv1ldr or lv2ldr depending on 0 or other number in NAND FS
lvldr ----> lv1.self ----> cell_ext_area partition NAND, boot compressed linux kernel for example

load trvk_prg
spu_pkg_rvk_verifier.self load trvk_pkg
lv2ldr load lv2_kernel.self
spp_verifier.self load default.spp (bluetooth ?)
isoldr (?)
appldr (?)
sc_iso.self (?)
LV2 KERNEL MODULE ----> spu_token_processor.self
LV2 KERNEL MODULE ----> aim_spu_module.self
LV2 KERNEL MODULE ----> mc_iso_spu_module.self
LV2 KERNEL MODULE ----> ...
 

EVE Online Update Wipes XP BOOT.INI

50°
367w ago - Installed the latest EVE Online update earlier today? Don't reboot your computer! The update apparently has a "bug" which results in the deletion of your BOOT.INI startup file on XP systems. No big deal, aside from the fact Windows won't boot with this file missing.

CCP has removed the update as of 4 A.M. GMT today. However, if you are running XP and have downloaded and installed the update before said time, then your BOOT.INI is most likely long gone.

As for steps to remedy this problem, first check to make sure the BOOT.INI file exists:

If you are only using the Classic client or installed the Premium client using the full Premium installer than you are not affected.

If you upgraded from the Classic client to the Premium client, using the content upgrade, then please read on.

Check the root directory of your hard drive and see if you have a boot.ini file, if so then you are not affected. The file is normally hidden so you need to click Tools : Folder Options : View and select "Show hidden files and folders" and uncheck "Hide protected operating system files" to be able to see it.

You can also check for the presence of this file by clicking Start : Control Panel : System : Advanced : Startup and Recovery : Settings (third button down)....
 

PS3 Development Discoveries: Week 1

100°
371w ago - Each week or so we will post a brief report from the resident PS3 Devs here, and below is one for this week:

The PS3 Boot-up Procedure.

The SCC (Super Companion Chip), made by Toshiba gets the PS3 started up. It reads asecure_loader from flash, and loads it into SPE in isolation mode. The Flash reading is interesting, as the data on the flash chips are interleaved, so the SCC merges them, among other things.

asecure_loader is then decrypted and ran, and it brings up lv1ldr. The keys for self decryption (among other things) are most likely accessible at this time.

lv1ldr is then decrypted and ran, and verifies the integrity of lv1.self , decrypts and runs it.

lv1.self is most likely our base code, also known as the Hypervisor. The Hypervisor then calls lv2ldr.

lv2ldr is ran, and it runs lv2_kernel.self

LV2 kernel.self is essentially the PS3OS, it starts up, brings the XMB up, any game/movie in the drive.

This is a solid working theory. Without expensive hardware, we can not confirm this 100%, but it is the most logical approach!

A few select files from the flash:

asecure_loader
lv1ldr
lv2ldr
isoldr
appldr
default.spp
lv0
lv1.self
lv2_kernel.self
 
Sponsored Links

Sponsored Links
Sponsored Links

Sponsored Links






Advertising - Affiliates - Contact Us - PS3 Downloads - Privacy Statement - Site Rules - Top - © 2015 PlayStation 3 News

Sponsored Links