![]() The keys are registered and if broken a firmware update will take care of that. It's unique system with many different layers including watermarking if they so choose to enable that feature. All I know is that this is not a PSP or any other device. However, that doesn't mean that he can't simulate that and then run "homebrew" codes (e.g.: Calculate 2+2 instead of what I told my PS3 to do: which is calculate 1+1).īut your forgetting that that data better have an encoded key or your attempt to fool it will fail. īasically, what this means is that even IF a hacker gains root access to my PS3, it still can't find out that I'm calculating 1+1 on the locked down SPE. Once it's done the computation, it spits out the number "2" and no one is the wiser. If I want to do 1+1 because I'm dumb, but I don't want others to know that I'm doing it since I don't want them to know that I'm dumb, I pass the logic off to the SPE and tell it to keep its mouth shut. It's not the "next-generation anti-hacker super-duper automated Hal 40K hacker pwnz0r shield layer" that you may think it is :lol. Basically, what's going on is that a SPE can be locked down to do a task that no one else can get at. It is awesome seeing how things finally get more interesting again for the PS3 scene by the announcement of a software NAND flasher for the latest PS3 Firmware and the fact that a PS3 CFW for the latest PS3’s is being worked on.ĭownload: ps3_idps_dumper-v0.2.1a-PS3XPloit.[QUOTE="The_One, post: -=*7*=-: Actually, your understanding of the security feature is flawed. If everything went correctly you should now have a file called idps.bin on the root of the USB which contains your IDPS. The CMD on your PC will throw some lines at you but when you see this the Dumper is finished and your PS3 should shut down. After selecting the option just wait until your PS3 shuts down by itself. Only the very old Phat PS3’s use NAND and every other PS3 uses NOR. Now select your PS3’s Flash Storage Type. Don’t forget the port behind the ip (:8080)(Press “Start” to open the address bar) Now open your PS3’s Webbrowser and enter the ip shown in the cmd window. If the Windows Firewall pops up you will have to allow access.ģ. If this doesn’t work you can also cd into the IDPS Dumper folder and start the windows.bat. ![]() Open it up and double-click the windows.bat to start the exploit server. If alls installed you will have to log out and login again so that the Python Variable in Path can be used in CMD later on.Ģ. If you’re done installing Python you can install Capstone next. Make sure to check “Add to System Path” at the selection menu. IDPS Dumper 4.81 (The Download Link is at the End of the post).Ī USB Stick formatted with FAT32 (Make sure to plug it into the right USB Port of your PS3)ġ. The only thing left is a software flasher which can then flash back a modified flash to 25xx PS3’s since for that metldr would need to be cracked but for these PS3’s the Team will start working on a Henkaku like CFW after finishing the Flash Writer for the older PS3 Modells.īut for now, let’s talk about how you can dump your PS3’s IDPS for use with for example PeXploit. The Team has a working software flash dumper which works on all PS3’s. But with this, the Team has also announced something far more interesting in terms of CFW. Thanks to the Team behind the PS3Xploit Project consisting of w, esc0rtd3w and bguerville you can now dump your IDPS again on the latest PS3 Firmware 4.81.Īnother good thing is that this can only be patched with a new Firmware. It’s been awhile since flatz method of getting the IDPS on Firmware 4.70 and below has been patched and people wanting to use PeXploit had no luck.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |