Your Ad Here

Poll: Does Sony Have the Right to Put a Rootkit on your PS3?

CLICK HERE TO VOTE NOW

• Yes, definitely.
• NO! that's insane.
• Don't know. Don't care.
• What PS3 rootkit?!


Over 51,000 visitors on JAILBREAKSCENE.COM have seen this news and now we want to know what you think, by voting!

Decryption of lv2diag.self file successful, Service Jig master key dump coming

 ImageShack, share photos, pictures, free image hosting, free video hosting, image hosting, video hosting, photo image hosting site, video hosting site

Developer graf_choko has released an update to his reverse engineering effort of this PS3. He mentioned that he was able to decrypt the lv2diag.self file. This specific file is a Sony Service file that is currently used by the PSDowngrade software for the purpose of downgrading the PS3. Because the lv2diag.self is decrypted, developers can now study how the downgrade process works. Additionally, graf_choko has plans to dump the master key for the PS3 Service Jig using a development board and two original PS3 (not slim) systems running firmware v3.15. Not to mention, a self decrypter tool for decrypting lv2diag.self file will be released to the public soon.
Guys, i know you are waiting for the USB Dongle Master Key from me :-) I have got now 2 fat PS3 with HV 3.15 but unfortunately no SX28 development board yet to exploit it :-)

But i was not idle and the last and this week i was working on reversing of self decryption. And now i’m able to decrypt SELFs and SPRXs on my exploited GameOS by using HV calls only and no GameOS functions at all :-) I reversed the interface to appldr which decrypts SELFs on GameOS 3.41.

So you wont’ get bored until i get the USB Dongle Master Key, i will make my findings and my source code public very soon and you will be able to decrypt your favourite games and programs by yourself :-) Let the fun begin, guys :-) 


Here is a “small” teaser of decrypted Lv2diag.self from service JIG :-)

http://pastie.org/1333833

source

No comments:

Post a Comment

Your Ad Here