82w ago - This weekend PlayStation 3 hacker an0nym0us has released a PS3 homebrew utility called MemDump v0.01 which allows end-users to dump LV1, LV2, NAND / NOR Flash and eEID from the GameOS, with the details below as follows:
From the PS3 Dev Wiki (linked above) and included ReadMe file:
For all of you out there intereseted in, or already in the process of reverse engineering the PS3, this new tool will make your life a whole lot easier! Now you can dump LV1, LV2, NAND/NOR Flash and eEID from one tool!
There have been methods in the past that accomplished the same goals, but certainly the ease of use and speed hindered many. Of course, none had such a beautiful user-interface either.
Place the necessary pkg file in the root of an empty USB flash dongle, and install like any other pkg.
1. Place pkg on USB flash dongle.
2. Select "memdump" icon.
3. Select type...
169w ago - Today CJPC has assisted blackb0x with their latest release, dubbed PS3 LV2Dump v0.7a which enables PSGroove users to finally dump the PS3 LV2 GameOS for examination, followed shortly by a PS3 LV2 Dump for those interested to examine!
Today CJPC has assisted blackb0x with their latest release, dubbed PS3 LV2Dump v0.7a which enables PSGroove users to finally dump the PS3 LV2 GameOS for examination!
187w ago - Update: An English update of JaicraB's KeyFindPuP application is now available HERE courtesy of kakashigr.
Just over a month ago JaicraB attempted to dump the PS3 Hypervisor LV2 (GameOS) and revealed how it was done, and today he has released a KeyFindPuP application alongside details on their PS3 LV2 dump progress.
192w ago - As promised, today JaicraB has revealed the PS3 Hypervisor LV2 (GameOS) dump method and circuit used to allow the PS3's memory to persist while booting into OtherOS, which then allows dumping of the memory.
This was apparently on a CECHG model system with board model SEM-001 1-875-384-21
To quote, roughly translated: DemonHades / JaicraB Extraction Method:
First of all, be careful if you're going to attempt this, I am not responsible.
It's about keeping the RAM alive when moving to OtherOS. To do this the ram must be fed at all times so as not to erase the data.
Overview map Refer to the First Image below.
Zone A http://4.bp.blogspot.com/_4rtVxQc9D6s/S7dexn30R7I/AAAAAAAAAFs/tpo2XxknPKs/s1600/Zona+A.JPG
This area is sensitive. At that point we had settled with two resistors together. You have to remove it (remove it, but you could also cause a short circuit). It has 4 legs. At this point it tells the RAM and the integrated MOSFET turns off.
Zone B http://3.bp.blogspot.com/_4rtVxQc9D6s/S7deyC8VeyI/AAAAAAAAAF0/bGUuh1knvRA/s1600/Zona+B.JPG
197w ago - Today we have some news from Spanish PS3 developer DemonHades (linked above) of their ongoing PS3 Hypervisor and Bootstrap lv0/lv1 examination, and news of CodePlay's Offload: Community Edition which is now available free for Cell Broadband Engine devices.
To quote: "The Offload tool suite provides the Offload tool as well as a full Windows based GCC SDK, enabling the easy offloading code to the SPUs on the Cell Broadband Engine.
It also includes integration with a Cell Broadband Engine enhanced Eclipse CDT, and the Offload Player Debugger, for executing and debugging code on the target Cell Broadband Engine hardware. Offload: Community Edition is free to use for academic research and commercial projects, subject to licensing conditions."
Below is DemonHadesPS3 Hypervisor and Bootstrap Dump lv0/lv1 examination findings thus far, roughly translated via Google. If anyone who is fluent in Spanish can add to it feel free to...