- As a follow-up to his PS3 Hypervisor Reverse Engineering Progress
report, today graf_chokolo
has published on xorloser
's blog (linked above) his updated PSGroove payload which now allows for decrypting PKGs from PS3 PUP files.
Download: Grafchokolo PSGroove Payload
/ [Register or Login to view links]
To quote: "So guys, I promised to you that I will made my PSGroove payload public.
I just uploaded it to github. Let me first explain how it works. I do not have much free time, so please do not expect me to explain every detail to you. The target group of this release are advanced programmers among you. The source code is not commented but it's clean, well structured and self-explaining.
My payload has 2 stages. The 1st stage is actually a PSGroove payload. It initializes the gelic device and allocates memory needed for the 2nd stage. Just compile the 1st stage binary, convert it to C hex array and replace the PSGroove payload.
The 2nd stage does the real job, e.g. decrypts a CORE_OS_PACKAGE.pkg from a PUP file, runs some isolated SPU module or dumps...