Della serie: "LA COERENZA è IL MIO FORTE!!!"
Dopo alcune settimane dal video in cui faceva vedere al mondo di essere riuscito nell'hacking del Firmware 3.60, Mathieulh finalmente si decide a rivelare (apertamente?) l'exploit che permette di dumpare il LV0 del nuovo Firmware in modo da poter ottenere facilmente le nuove chiavi del 3.60.
A cosa porterà tutto questo? Secondo Mathieulh non a un CF 3.60 come molti invece speravano, ma il venire in possesso delle nuove chiavi porterà comunque grandi benefici ai possessori degli attuali Custom Firmware perché, ad esempio, si potrà ottenere la nuova passphrase per poter tornare di nuovo online sul PSN spoofando la versione del Firmware, o soprattutto si potranno decriptare gli EBOOT.BIN degli eventuali futuri giochi che richiederanno il Firmware 3.60 in modo da avviarli senza problemi anche sui vecchi CF.
Nell'articolo completo tutti i tweet e l risposte di Mathieulh.
Di seguito vi riportiamo tutte le varie risposte e i vari tweet di Mathieulh che, messi insieme, aprono la strada verso l'acquisizione delle chiavi del 3.60 (qualcuno, ma è ancora un rumor, sembra sia riuscito già ad ottenerle grazie a questi suggerimenti del francese!):
- Codice: Seleziona tutto
@xShadow125 You can't overflow user processes, the NX bit applies here, you can only overflow lv2 or a process with higher privileges.
@xShadow125 You can update from your pwn pup only from 3.55 or lower, unless you have an exploit.
@xShadow125 Of course that should be fixed in upcoming lv0 revisions anyway (By moving the ldrs to the top of lv0)
@xShadow125 You run the 3.60 lv0, then you switch the nor, and pull the cell reset line, and you dump the extra KBs where the loaders are.
@xShadow125 Basically you have a nor with 3.55 (or lower) lv0 and your own small lv1 code that does the dump, and 3.60 lv0 on the other.
@xShadow125 You wont get all of lv0 but the part with the loaders shouldn't be overwritten.
@xShadow125 You can actually get all the 3.60 keys/loaders without knowing lv0 keys by dumping lv0 from ram with dual nor and signed lv1.
@xShadow125 That's from an older lv0, the method to get the data isn't the same, the one I posted was a dump, this one is a decryption
@xShadow125 There is a nice way to dump pre 3.55 lv0 as well by using a small lv1 binary, it's a risky process though.
@xShadow125 Oh! You mean my pm ? congrats, you just figured I have had lv0 dumped/decrypted for quite some time xD
@xShadow125 Reminds me of those stupid lv2 overflows I spotted ages ago in the bdemu code, which are useless now on 3.55+ anyway.
To those planning on building a 3.56+ pup for whatever reason, the files attributes changed, the group and user ids for the files as well.
The new 3.56+ values for tarballs are the following: owner_id, "0000764" group_id, "0000764" owner, "tetsu" group, "tetsu" ustar, "ustar "
You can use fix_tar to use those new values. Use with caution.
By comparison, those are the pre-3.56 values. owner_id, "0001752" group_id, "0001274" owner, "pup_tool" group, "psnes" ustar, "ustar"
@davidkont 3.60 isn't "hardcore security" anyway, it's just sony thinking they are safe hiding everything inside lv0...
@Ps3WeOwnYoU You can't decrypt lv0 without the bootloader keys. Your best bet is to look at 3.56, decrypt loaders, look for exploits, profit
@Ps3WeOwnYoU You need to either decrypt or dump lv0, then you can get the encrypted loaders and decrypt them with the metldr key. Good luck.
fonte; ps3-ita