Re: [PS3 ] PS3 全裸了嗎?

看板Modchip (改機)作者 (Savannah)時間13年前 (2011/10/27 16:25), 編輯推噓25(25012)
留言37則, 27人參與, 最新討論串3/7 (看更多)
ps3hax那篇重點以外的東西太多,PS3DevWiki上有比較詳細的解釋 http://ps3devwiki.com/index.php?title=Per_Console_Keys per_console_root_key_0 絕對管理員金鑰 0 〔所謂絕對是指世界上就只有這麼一把,不會有第二把相同的金鑰了,跟絕對座 標的絕對意義相同〕 metldr is decrypted with this key metldr靠這把金鑰解密 bootldr is decrypted with this key bootldr 靠這把金鑰解密〔是故,取得此一金鑰即可改寫bootloader,如果 bootloader不是燒死在唯讀記憶體中的話〕 might be obtained with per_console_root_key_1? (largely speculative, not nec. true - need more looked into, only based on the behavior of the other derivatives known to be obtained through AES) 或許可以藉由絕對管理員金鑰 1號回推?(有很大的猜測成份,證據不足還 需再要深入研究,猜測的基礎是 AES加密演算法的運作原理) per_console_root_key_1/EID_root_key 絕對管理員金鑰 1/ EID管理員金鑰 derived from per_console_key_0 源自絕對管理員金鑰 0號 stored inside metldr 儲存在metldr裡頭 copied to sector 0 by metldr 稍後被metldr複製到第 0區間〔雖然sector也有磁區的意思,但此處應該不 是〕 cleared by isoldr 接著被isoldr清除 Used to decrypt part of the EID 可用來解密部份的 EID資訊 Used to derive further keys (per_console_key_0 is not the key which will be derived, but is the key which has derived per_console_key_1) 可用來計算其他的金鑰(除了絕對管理員金鑰 0號之外,因為金鑰 1號是由 0號導出的) can be obtained with a modified isoldr that dumps it 可藉由修改isoldr取得 can be obtained with a derivation of this key going backwards 也可自由它導出的金鑰來回推〔理論上可以這麼做,但不實際〕 Obtaining It 該如何取得 Launch the patched isoldr with your prefered method, let it be Option 1, or Option 2... 要載入修改過的isoldr總共有兩種方式,隨你喜歡,以下稍做解釋: Option 1 - Dumper Kernel Module 方法一:在 Linux核心上附加讀取模組 modify glevands spp_verifier_direct to dump the mbox to wherever_you_want and then (use the payload below as an example) 將glevands的spp_verifier_direct 掛載成為核心模組(底下使用酬載的方 式原理相同) the example code on how to dump the mbox can be found on 'Option 2 -Dumper Payload' below 範例程式碼可自底下Dumper Payload的部份取得 host $ insmod ./spp_verifier_direct.ko host $ cat metldr > /proc/spp_verifier_direct/metldr host $ cat dump_eid_root_key.self > /proc/spp_verifier_direct/isoldr host $ echo 1 > /proc/spp_verifier_direct/run host $ cat /proc/spp_verifier_direct/debug host $ cat /proc/spp_verifier_direct/wherever_you_want Option 2 - Dumper Payload 方法二:直接送入酬載 http://pastie.org/pastes/2101977 patched isoldr to dump it 以上方法皆須搭配修改過的isoldr使用 *DO NOT CREATE AN MFW USING THIS IT WOULD BRICK PS3 警告:請勿將此檔包入自製韌體中,否則會變磚 patched isoldr: http://www.multiupload.com/2MP5KY28EZ this can be loaded as the payload stage2 in the payload marcan used to load linux 可利用marcan的方式在stage2載入酬載 http://marcansoft.com/blog/2010/10/asbestos-running-linux-as-gameos/ http://git.marcansoft.com/?p=asbestos.git this can also be loaded as with lv2patcher and payloader3 亦可透過lv2patcher與payloader3送入酬載〔推薦之,簡單很多〕 Comments What this selfs do is dump your ISOLATED SPU LS through your mbox, so you only need a way to cach this info with PPU code in lv2 enviroment aka a dongle payload or linux kernel. 這個self程式的功能是把 SPU裡頭的東西讀出來,稍後可以透過能在 lv2 上執行的程式,例如 Linux和新貨是電子狗酬載來讀取。 This has been tested and proven to work on 3.55 MFW. 此一原理已於3.55-MFW上測試成功 In the dump the remaining dump is the metldr clear code. metldr clears itself and all the registers an jumps to isoldr. 現在還差臨門一腳的是metldr的程式,因為metldr會把自己刪除,同時把暫 存器清空,然後跳到isoldr Overwritting that code lets you dump your key + metldr. 修改這些程式就能得到金鑰跟metldr程式 Consider that per_console_key_1 and per_console_key_n are in fact still in need decryption. 必須考慮絕對金鑰 0與絕對金鑰 1取出時仍然是加密的狀態 per_console_key_0 particularly needs to be dumped once revived from per_console_key_1. 絕對金鑰 0在金鑰 1生成的時候就要讀出,是唯一機會。 per_console_root_key_2/EID0_key 絕對管理員金鑰 2/ EID金鑰 this key can be obtained through AES from EID_root_key 可利用 AES演算法配合 EID管理員金鑰導出 EID can be partially decrypted by setting this key in anergistics and fireing aim_spu_module.self 利用本金鑰搭配aim_spu_module.self 模組可以解出部份的 EID內容 Load aim_spu_module.self + EID0 + EID0_key in anegistics = decrypted EID0 This code is to decrypt your EID0 on your PC http://pastie.org/2000330 解碼用的範例程式 The prerequisites are: 前置作業: dump your EID0 from your ps3 and save it in the same folder as EID0 將EID0自主機讀出,並存放在電腦上某個目錄 dump your EID0_key from your ps3 and put it on the code above where the key is needed 將EID0金鑰讀出,並放在程式碼所指定的目錄中 load all of them in anergistic 全部塞入anergistic程式中 EID0_key could also be obtained with EID_root_key directly in the following manners: EID0金鑰可與 EID管理員金鑰用以下方法同時取得: knowing the algorithm (located in isoldr) and applying it to the EID_root_key 知道演算法(存在isoldr中)與 EID管理員金鑰,用電腦解碼 leting isoldr apply that algorithm directly in anergistic the process is exactly as the one above (modifing anergistic to feed isoldr with EID_root_key 交給isoldr來辦,修改anergistic程式,讓isoldr解出後直接吐出金鑰 Obtaining It 該如何取得 patched aim_spu_module to dump it 利用修改過的aim_spu_module讀出 *DO NOT CREATE AN MFW USING THIS IT WOULD BRICK 警告:請勿將此一檔案包入自製韌體中,否則會變磚 http://www.multiupload.com/1XUOOYS9I0 per_console_root_key_n 絕對管理員金鑰第 n These are further derivations of the per_console_key_1/EID_root_key 由絕對管理員金鑰 1/ EID管理員金鑰導出 ****** 就等吧,現在這些工具還不大好用,聖誕節前應該會有新消息,拿到rootkey 後 SONY不推新主機,最壞的情況就只能退守 PSN防線。 -- ____ _ _ _ _ ____ _ _ ____ _____ ____ (_ _)( \( )( \/ )( ___)( \( )(_ _)( _ )( _ \ _)(_ ) ( \ / )__) ) ( )( )(_)( ) / (____)(_)\_) \/ (____)(_)\_) (__) (_____)(_)\_) -- ※ 發信站: 批踢踢實業坊(ptt.cc) ◆ From: 140.120.31.137

10/27 17:24, , 1F
真的要被脫光了 專業再推一次
10/27 17:24, 1F

10/27 17:56, , 2F
專業推
10/27 17:56, 2F

10/27 18:31, , 3F
感謝你的專業!
10/27 18:31, 3F

10/27 19:38, , 4F
推專業w
10/27 19:38, 4F

10/27 21:41, , 5F
次世代主機制霸時代來臨!!
10/27 21:41, 5F

10/27 22:25, , 6F
該不會又是內鬼吧@@
10/27 22:25, 6F

10/27 22:41, , 7F
TrueBlue還比較有可能是內鬼,root key這個不太像,因為
10/27 22:41, 7F

10/27 22:42, , 8F
glevands這人本來就很厲害,讓厚機的Linux能開啟無線網路
10/27 22:42, 8F

10/27 22:42, , 9F
也是靠他的驅動程式,現在RSX的驅動程式也是他在寫
10/27 22:42, 9F

10/27 23:33, , 10F
這人好強
10/27 23:33, 10F

10/28 00:04, , 11F
專業推
10/28 00:04, 11F

10/28 00:10, , 12F
意思是拿到絕對金鑰,以後不管啥加密都可以用這個導出?
10/28 00:10, 12F

10/28 00:28, , 13F
我要再推一次w
10/28 00:28, 13F

10/28 01:42, , 14F
rootkey一被取得整個加密機器就全破了 (同hdmi加密法)
10/28 01:42, 14F

10/28 02:17, , 15F
拿到絕對金鑰 PS3就準備裸奔到PS4出來 是這個意思吧?
10/28 02:17, 15F

10/28 06:16, , 16F
XDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
10/28 06:16, 16F

10/28 07:48, , 17F
PS3撐這麼多年其實已經很強了
10/28 07:48, 17F

10/28 07:50, , 18F
話說C大只對PS3破解有興趣嗎?
10/28 07:50, 18F

10/28 09:18, , 19F
我手邊能夠讓我研究的也就iPhone 2G、網樂通、跟PS3而已
10/28 09:18, 19F

10/28 10:26, , 20F
PS3跑模擬,iPhone當隨身秘書,網樂通養動物,就降
10/28 10:26, 20F

10/28 11:09, , 21F
隔壁兇盒都不知道被脫光多久了XD
10/28 11:09, 21F

10/28 12:11, , 22F
現在只能期待了...
10/28 12:11, 22F

10/28 16:30, , 23F
P3真的很強 而且大部分的人其實不知道P3有被破解
10/28 16:30, 23F

10/28 20:33, , 24F
不能噓。・(つД`)・゚
10/28 20:33, 24F

10/28 20:48, , 25F
樓上拍拍
10/28 20:48, 25F

10/28 21:35, , 26F
XDDDDDDDDDDDDDD
10/28 21:35, 26F

10/28 21:54, , 27F
PS3君XD
10/28 21:54, 27F

10/28 22:01, , 28F
PlayStation3:再過來我要叫瞜
10/28 22:01, 28F

10/28 22:05, , 29F
PS3 超愛戰的 在電蝦 PS版都被水桶
10/28 22:05, 29F

10/28 22:31, , 30F
蛤? 我在PS板被水桶?我怎麼不知道?
10/28 22:31, 30F

10/28 23:02, , 31F
上面有台主機在亂跑,大夥上,先把他拆了再說!
10/28 23:02, 31F

10/28 23:15, , 32F
Modchip在Modchip都被桶過了 PS3被捅又沒啥好奇怪的 (誤
10/28 23:15, 32F

10/28 23:15, , 33F
話說電蝦首篇文章 今天居然放槍兩次了...
10/28 23:15, 33F

10/28 23:52, , 34F
o杰~ o杰~ o杰~ 我還要再改十台PlayStation3啊~
10/28 23:52, 34F

10/30 19:03, , 35F
最終只能回到psn做防守了吧~
10/30 19:03, 35F

11/06 04:54, , 36F
2G是?
11/06 04:54, 36F

11/29 08:40, , 37F
好專業好強大
11/29 08:40, 37F
文章代碼(AID): #1EgHM5iW (Modchip)
文章代碼(AID): #1EgHM5iW (Modchip)