Originally Posted by JonahUK
Thanks for the confirmation that the data in the dump does in fact match and is valid.
But, as you say, the issue is now rebuilding.
Once a process is kind of workable, then newer games can be worked
I think i have all the information i need, to do it by hand right now, if i wanted. But i don't do cracks. Your original comment holds true, you can get the needed information from the original eboot.bin.
From the raw copy of the dumped elf, we're missing some info that is present in a normal, decrypted eboot.
From the ELF, missing is ELF64 Section Headers (seems to start at 0x914B17 in the original eboot.bin) Note, SCEtool can read this info without any keys
So i guess, the procedure then becomes as simple as:
1. Grab ELF from core dump (determine where it ends, from scetool..)
2. Dump the ELF64 section header info from the original eboot.
3. cobble both together into a new eboot.elf
This does _NOT_ cover sprx loading EBOOTS!@@#!#@