abgx360

Wednesday, 1 December 2010

Graf Chokolo Decrypts OtherOS.self, PS3 Service JIG Lv2diag.self

A few weeks back graf_chokolo announced that he decrypted PS3 Firmware 3.50 and work on a free public PS3 Downgrader was underway, followed by a PSGroove Payload update to decrypt PKGs from PlayStation 3 PUP Files with today's update including the OtherOS.self and Lv2diag.self from a PS3 Service JIG decrypted!

Download: Decrypted Lv2diag.self from PS3 Service JIG (Teaser)

To quote via xorloser's blog, linked above, on the PS3 appldr interface reversal progress:

graf_chokolo says: Guys, i know you are waiting for the USB Dongle Master Key from me :) I have got now 2 fat PS3 with HV 3.15 but unfortunately no SX28 development board yet to exploit it :)

But i was not idle and the last and this week i was working on reversing of self decryption. And now i’m able to decrypt SELFs and SPRXs on my exploited GameOS by using HV calls only and no GameOS functions at all :) I reversed the interface to appldr which decrypts SELFs on GameOS 3.41.

So you won’t get bored until i get the USB Dongle Master Key, i will make my findings and my source code public very soon and you will be able to decrypt your favourite games and programs by yourself :-) Let the fun begin, guys :)

Here is a “small” teaser of decrypted Lv2diag.self from service JIG :)

http://pastie.org/1333833

You cannot decrypt isolated SPUs with appldr, i think, because they are decrypted by isoldr.

I’m able to decrypt hdd_copy.self from 3.42 but not from 3.50

otheros.self decrypted :)

Stay tuned for more PS3 Hacks news. Also be sure to drop by the PS3 Hacks Forum for updates!


Graf Chokolo Decrypts OtherOS.self, PS3 Service JIG Lv2diag.self

No comments:

Post a Comment