Newserator Posté(e) le 23 décembre 2011 Posté(e) le 23 décembre 2011 Depuis un mois, un hacker anonyme à mis en ligne un pack de fichiers qu'il dit être utile pour le jailbreak du firmware 3.73, le mode factory sur les firmwares 3.6+ et la conversion CEX to DEX, une exclusivité Ps3crunch.net qui fut rapidement retirée car l'archive de fichiers contenait un virus. Un jour après, le forum PS3Hax.net prend l'archive, la désinfecte et propose la news avec le message de cet anonymous. Malheureusement personne n'a pu rendre utiles ces fichiers au point qu'il ont été oubliés. Aujourd'hui, Crash Serious, le développeur PS3 bien connu vient de relancer le sujet, comme appuis il propose un utilitaire qu'il nomme Unsig, il a comme fonction le décryptage des fichiers SIG proposés dans la fameuse archive d'anonymous. Avec cet outil, il ouvre la porte aux autres développeurs histoire d'étudier un peu plus ces fichiers et pourquoi pas les exploiter. En tête des buts d'Unsig, la conversion CEX to DEX, c'est à dire installer correctement un firmware debug sur une console retail. (Pour rappel la team Rebug disait elle aussi travailler sur un projet de ce type) Avec cette release, CrashSerious lance un appel aux différents développeurs de la scène les invitant à travailler ensembles et à partager leurs trouvailles. Cet appel a trouvé vite une petite réponse de chez RichDevX qui lâche un fichier système nommé ssleay32.dll, un patch utile pour les travaux sur l'ObjectiveSuites. Citation : Good Day everyone, This time I figured I'd release something I've had a while but didn't think it would be useful to anyone. However, several people I mentioned it to were quite interested in the tool, so I figured I'd bring it out as a release. I'll be honest, I have ulterior motives... We used the last month's winnings to purchase Cobra dongles for the entire team. This month, we're planning on using the donation (should you decide this is worthy to vote for...) to purchase flasher's to protect our PS3's from a Cobra/TB brick. This release is a tool that will decrypt (and then also re-encrypt) the SIG files that were leaked in the CEX-DEX packages earlier this year and also the files released by an0nymous a month or so ago. The SIG files have not gotten a lot of attention, maybe because no one could read them. However, that's about to change. Why should you care about this release? Because the SIG files are a list of instructions for the objective suites application to interface to the lv2diag.self files that were leaked with the previous Objective Suites stuff. Very low level stuff, for the most part, that will actually let you modify settings in the PS3 firmware. With the proper information (the piece that math has kept to himself), CEX to DEX conversions are not only possible-- but are a reality. Things like reading (and writing) the ECID, IDPS, KIBAN_ID, and console serial number... just to name a few. Basically, it's a very low level trusted connection that is made and the PS3 does what you ask it to via Objective Suites. How do I use this? To un-SIG---- In the unsig tab, select "Open SIG File" and the file's encrypted contents will be loaded and displayed in the first text box. Then Select "Decypher" and the Decyphered text will be displayed in the second. It will also create an Microsoft Excel readable (and editable) file in the same folder with ".XLS" added as an extension. To Re-SIG---- In the resig tab, follow the same exact process as above except select the xls file. The process works the same, except the file saved as a ".SIG" extension on it. Keep in mind, while this tool will create a valid SIG file that Objective Suites *CAN* use. It should initially be used as a tool to learn more about the SIG file format. If you find something useful in reversing the SIG files, do me a favor--- put it in the wiki and give back to the scene, would ya? You can start off by looking here -> SIG_File_Format - Ps3 development wiki What we were attempting to convey last month is that, honestly, people need to work together more. No one person is going to break the PS3 wide open. GeoHot, didn't do it by himself. Kakaroto, won't by himself. And neither will math. It's time to work together as a collective group, and not as a bunch of disfunctional individuals. Together we are strong, separately we are just weak. ONE FINAL NOTE: the last release of Objective Suites that an0nymous leaked had a trojan in it--- BE AWARE and BEWARE!! I know ps3hax released a cleaned one and the first release was virus free. Make sure you get that one if you run the Objective Suites application. HOWEVER, the SIG files in the An0nymous release are new and of value to the scene. Merci à the-green pour l'information. Site officiel : http://psx-scene.com Lien vers article original : http://ps3.gx-mod.com/modules/news/article.php?storyid=3040
the-green Posté(e) le 24 décembre 2011 Posté(e) le 24 décembre 2011 Bonjour, dans un petit tweet matinal "Crash Serious" promet deux petits cadeaux pour la scène dans les prochains deux jours I have gifts for you. Two of them over the next 48 hours... 3 if @humblebundle fixes things but you have to watch for them. Merry Christmas! Espérant que ça serait lié à la scène PS3 et qu'elle soit utile pour autant merci à lui et on lui souhaite lui aussi de bonnes fêtes de fin d'année.
deaphroat Posté(e) le 16 octobre 2012 Posté(e) le 16 octobre 2012 Petit déterrage... Avec la news d'aujourd'hui, un nouveau mot m'est apparu ObjectiveSuites et que j'avais loupé quelques news... Mais en faite non. Ca remonte a loin mais on voit les histoires de cex to dex... Hello PS3 Scene, this is another anonymous leak! I would like to be called: anon0 to prevent confusion with all the other ‘anonymous’ members 2 months ago, a CEX-to-DEX came out which needed the request-idps.txt It was all accomplished by .SIG files and ObjectiveSuites, they are encrypted files which carry out specific commands to the PS3 We are now bringing THREE new .SIG files which can be used with 3.73 FW to carry out certain ‘tasks’ Figure what it can do by yourself… And samples of many files can be found there which can aid in 3.73 getting hacked… To use ObjSuites: Put PS3 in service mode, connect PS3 to PC by ethernet cable, IP Address to 192.168.0.100 Copy files from objcon to root of your usb drive Start ObjectiveSuites, then power the PS3 All info necessary will be in the temp folder in objectivesuites… This is a part-of-the-equation of hacking the 3.73 Some notes: I can guarantee something: There are many exploits present when ObjSuites connects to PS3, it forms a trusting bond… ObjSuites gets LV0/LV1 access Use this with care… 10:44 anonym0us – Okay10:44 anonym0us – let me explain 10:44 anonym0us – ObjectiveSuites is used in combination with a jig 10:45 anonym0us – It allows more things to be done while PS3 is in service mode 10:45 anonym0us – something like 2 months ago 10:45 anonym0us – There was a leak 10:45 anonym0us – that allowed Retail->Debug 10:45 anonym0us – but it required a person getting request_idps.txt 10:45 anonym0us – from Sony 10:45 anonym0us – It was accomplished by a .SIG file 10:46 anonym0us – .SIG files carry out commands to the PS3 10:46 anonym0us – So 10:46 anonym0us – I got hands on 3 more .SIG files 10:46 anonym0us – Which report all kinds of things about the PS3 10:46 anonym0us – But, there is another thing 10:46 anonym0us – When ObjSuites is used with the PS3 in service mode 10:46 anonym0us – We can exploit the PS3 10:47 anonym0us – Sony never bothered fixing bugs between the ObjSuites-PS3 connection 10:47 anonym0us – Reason? 10:47 anonym0us – The original ObjSuites required a membership to SCEDevNet 10:48 anonym0us – this is cracked 10:48 anonym0us – So 10:48 anonym0us – yeha 10:48 anonym0us – yeah 10:48 anonym0us – thats pretty much it 10:48 anonym0us – When PS3 connects to ObjSuites 10:48 anonym0us – you get LV0/LV1 access 10:48 anonym0us – you get LV0/LV1 access 10:48 anonym0us – So with a bit of tinkering 10:48 anonym0us – You can be sure that you can get the PS3 to do what you want ot 10:48 anonym0us – to* 10:48 anonym0us – And thats pretty much it
Elrat Posté(e) le 16 octobre 2012 Posté(e) le 16 octobre 2012 C'est une bombe ce soft à condition de savoir l'exploiter mais du moment que l'on a accès au lv0/lv1 on peu à mon avis faire beaucoup beaucoup de chose. cette nouvelle release en est d'ailleurs la preuve ;-)
clover25 Posté(e) le 17 octobre 2012 Posté(e) le 17 octobre 2012 En gros ce truc est un nouveau super exploit ?
Messages recommandés
Créer un compte ou se connecter pour commenter
Vous devez être membre afin de pouvoir déposer un commentaire
Créer un compte
Créez un compte sur notre communauté. C’est facile !
Créer un nouveau compteSe connecter
Vous avez déjà un compte ? Connectez-vous ici.
Connectez-vous maintenant