The above video goes away if you are logged in!

Results 1 to 6 of 6
  1. #1
    Pirate's Avatar
    Join Date
    Feb 2007
    Posts
    7,654
    Likes
    376
    Liked 8,954 Times in 1,469 Posts
    Mentioned
    997 Post(s)
    Tagged
    0 Thread(s)
    Feedback Score
    7 (100%)
    Downloads
    318
    Uploads
    231

    Unencrypted SPU Binary Found

    SKFU posted on his blog today that he discovered unencrypted SPU binary in the Def Jam: Icon demo (NTSC) for PS3.

    Quote from his blog:
    When I was bored yesterday I dealed with HDD decryption again and looked through the game folders on the decrypted HDD. The Def Jam: Icon USA Demo seemed interesting as it only works on US consoles. While looking for the answer I noticed a folder dj3-ps3-opt in /USRDIR/spu/. In there are several files like elf_sputhreads_apply.bin. I opened some files in a simple HEX editor and noticed that the files are not encrypted.



    Aswell it looks like a binary. It does not have the default binary header used by SPU .self files compiled with the SONY PS3 SDK. It may be compiled with a third party compiler or with the IBM Cell SDK. I did not check that, yet. Well, come back to check for updates regarding the research!

    - SKFU
    [VIA SKFU Blog]

  2. The Following User Likes This Post:


  3. #2
    Member
    Join Date
    Jul 2008
    Posts
    270
    Likes
    5
    Liked 21 Times in 19 Posts
    Mentioned
    1 Post(s)
    Tagged
    0 Thread(s)
    Feedback Score
    0
    Downloads
    45
    Uploads
    0
    Is there any chance of this being used to execute code on the PS3? Or is it just useful for creating a file format once we can execute code on the PS3?

  4. #3
    Member
    Join Date
    Jan 2008
    Posts
    51
    Likes
    7
    Liked 2 Times in 2 Posts
    Mentioned
    1 Post(s)
    Tagged
    0 Thread(s)
    Feedback Score
    0
    Downloads
    26
    Uploads
    0
    i think there is no chance to execute code with this. hypervisor is still present which will detect that the file is modified! so face it, ps3 is unhackable via software

  5. #4
    Apprentice
    Join Date
    Jan 2009
    Location
    Sweden
    Posts
    9
    Likes
    1
    Liked 0 Times in 0 Posts
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Feedback Score
    0
    Downloads
    19
    Uploads
    0
    wow, nice find by streetskaterFU
    PS3 60GB PAL | Firmware 2.76 | Ifcaro USB Loader 0.3 |

  6. #5
    Member
    Join Date
    Jul 2008
    Posts
    270
    Likes
    5
    Liked 21 Times in 19 Posts
    Mentioned
    1 Post(s)
    Tagged
    0 Thread(s)
    Feedback Score
    0
    Downloads
    45
    Uploads
    0
    How would the Hypervisor detect its modified? Is there a hash somewhere or does it chainload from a different file?

  7. #6
    Apprentice
    Join Date
    Jul 2008
    Posts
    5
    Likes
    0
    Liked 0 Times in 0 Posts
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Feedback Score
    0
    Downloads
    7
    Uploads
    0
    Changing the data will make any CRC hash check fail, therefore making it not be able to be run. The encryption key is and pretty much uncrackable without a farm of servers and a lot of time.
    It would be nice if you could post the data onto a file host so others could look. If it is not encrypted, is it not possible to find the CRC Hash check part of the source.

Bookmarks

Bookmarks
  • Submit to Digg Digg
  • Submit to del.icio.us del.icio.us
  • Submit to StumbleUpon StumbleUpon
  • Submit to Google Google

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •