On this extremely MUGGY day today, PlayStation 3 developer zecoxao shared some handy PS3 FNIDS Bruteforcers Python scripts with the PlayStation 3 scene with some changelogs below!
Download: nid_bruteforcers.zip (3.47 KB) / v2_bruteforce_fnids.zip (3.58 KB) / v3_bruteforce_nids.zip (3.63 KB)
To quote: This uses the CPU power to find fnids given the prefix and the hash name. The usage is as follows:
Example:
Remember, to increase the area of each character, increase it in i1,i2,i3,etc (For caps, small letters, and numbers)
4.py comes with i1 changed so look at it if you have doubts. It is VERY important that we find all of the unmangled fnids. Currently we have 2428 fnids out of 4985 (so almost 50%) We can do better than this
Good Luck
PS: You will have a lot of false results because the chance of collisions is bigger than in natural SHA1.
v2 Changelog:
Download: nid_bruteforcers.zip (3.47 KB) / v2_bruteforce_fnids.zip (3.58 KB) / v3_bruteforce_nids.zip (3.63 KB)
To quote: This uses the CPU power to find fnids given the prefix and the hash name. The usage is as follows:
Code:
<numberofchars.py> <prefix> <hashinsmallletters>
Code:
4.py BER_read_ cb4edaec
string is BER_read_item
4.py comes with i1 changed so look at it if you have doubts. It is VERY important that we find all of the unmangled fnids. Currently we have 2428 fnids out of 4985 (so almost 50%) We can do better than this
Good Luck
PS: You will have a lot of false results because the chance of collisions is bigger than in natural SHA1.
v2 Changelog:
- Added a dictionary to simplify the process
- Now converts the string automatically to lowercase, so you can use CAPS
- Added collision resolving (the nids START WITH the hash, not just contain it)