Join Us and become a Member for a Verified Badge to access private areas with the latest PS4 PKGs.
Status
Not open for further replies.
Following the PS3 WebKitSploit and PS3 Playground WIP, PlayStation 3 Browser Research and PS3 Webkit PoC today developers @bguerville, @esc0rtd3w and W shared a progress update on their 4.81 OFW Exploit known as PS3Xploit with a target date slated for Q1 2018, a PS3 software downgrader in development and a 4.81 IDPS Dumper that supports all PS3 consoles expected to arrive shortly. :ninja:

Download: ps3_481_idps_dumper-PS3XPloit.zip (48 KB) / ps3_idps_dumper-v0.2.1-PS3XPloit.zip (51 KB - with Python and Capstone) / ps3_idps_dumper-v0.2.1a-PS3XPloit.zip (51 KB - with Python and Capstone) / ps3_idps_dumper-v0.2.3-PS3XPloit.zip (17 KB) / ps3_idps_dumper-v0.2.3-PS3XPloit_-_4.82.zip (17 KB) / ps3_idps_dumper-v0.2.3-PS3XPloit.zip (Updated) (17 KB) / ps3_idps_dumper-v0.2.3-PS3XPloit_-_4.82.zip (Updated) (17 KB - with Python and Capstone) / Official PS3Xploit Domains

Since the PS3 OFW PSID Dump Tool Guide and PS3 IDPS Bruteforcer, the upcoming PlayStation 3 software flasher may soon make PS3 downgrading via hardware flashers such as E3, Progskeet and the recent NORwegian Teensy Clip Edition things of the past.

:alert: As always, be sure NOT to update your PS3 Firmware should any updates beyond 4.81 OFW get released by Sony following the recent PS3Xploit Team progress! :alert:

We'll update this article as things are publicly released, and here are some additional details on their PS3 projects from bguerville via PSX-Place, to quote:

Background

I started investigating the ps3 webkit about 6/7 months, but at the time, it was only to gather information, I had no idea I would eventually be the one working on it!

End of August, I gave the information I had to @esc0rtd3w & expected he would work on it alone. However, he knew nothing about webkit exploitation & he started to collaborate with W. By hijacking webkit, we inherit its privileges which means we are root & we get access to lv2 syscalls.

However the PS3 OS is protected by NX (No eXecute is the BSD/Linux equivalent of DEP on Windows), no address randomisation though. Executing our own payload is made impossible by NX but we can still execute code despite NX using ROP (Return Oriented Programming).

The principle is simple, select snippets from the system code (snippets like these are called gadgets) & assemble them so execution jumps from one gadget to the next until the task we planned is done. It requires providing values/parameters & offsetting to each gadget instruction as well...

First week of September, I joined their effort & 2 weeks later we had ROP execution. From that moment, I have been doing all the ROP development work alone while the other 2 helped with testing & researching (and debugging for esc0rtd3w).

Right now I have 2 ROP chains ready, one for IDPS dumping & the other for flash memory dumping.
  • The IDPS dumper is about to get released.
  • The flash dumper will be released later.
The next part of the job is to modify the flash dumper into a flash writer. When that is done & released, PS3 hardware flashers will have become mostly obsolete.

FYI, the IDPS dumper should work on any NOR/NAND model of PS3. Same goes for the flash memory dumper. It was tested ok on Superslim. Once the ROP work above is finished, there is much more to be done & hopefully more releases to come... Stay tuned.

The Current Status

For now the main project we are working on will not jailbreak all consoles. It will enable flash dumps from all consoles but flash write only to all consoles up to 25xx so consoles that are are not cfw compatible will not really benefit just yet, except for dumping flash & IDPS but not for JB.

For those with CFW compatible consoles on OFW, once flash is overwritten with a db OFW copy, a user can reboot then install the CFW of their choice. Hardware flashers being then obsolete.. You could also overwrite the flash memory in more recent consoles but that would result in a brick due to metldr2.

It's only after that flash management project is done, in hopefully March that we will begin working on exploiting lv2. If we get the results we wish, we should be able to make a TaiHEN type of hack for all consoles including Superslims.

Once lv2 is exploited, I am not sure yet how far I will take it, whether I will also try to take on lv1.. Or leave it for someone else to build on by releasing a fully commented & dev friendly version... We will see how things go...

However, even without lv1, direct access to lv2 functions using the right parameters would allow us to run homebrews (except those needing lv1 peek/poke) & backups without problems along with many other things.

The IDPS dumper will create a file on usb000 then beep 3 times & shutdown in all cases, even if flash memory read fails. emmc should not make a difference to this. You will get garbage in idps.bin in that case.

Js errors with a black page message on ps3 should not happen. If ever it did, just report & in the meantime keep relaunching the exploit. Nobody has had this issue in dozens of tests though.

And clearing cache or cookies is totally unnecessary with the exploit & the wk js interpreter. Between runs garbage collection will take care of cleaning up what is needed, the job it does is always sufficient.

:arrow: Update #1: From esc0rtd3w on the PS3 4.81 IDPS Dumper v0.2 (linked above), to quote: Ok... the moment all of you have been waiting for..... i assume :giggle:

File: ps3_481_idps_dumper-PS3XPloit.zip
MD5 Hash: FFDA70AB2D1677886083F99185C54FE3
SHA-256 Hash: 852BDB301753C4F4A7E946188E850D3D325EEAA259B61AE2B5AE31320B2F292B


Enjoy this release from our team (y)

We will be working hard to add EMMC support as soon as possible!!

The documentation will be updated as time goes on. There is a readme.txt file included with basic setup and usage instructions. Please stay tuned for future tools and releases :D

And once again, THANK YOU to everyone involved bringing this all together, without all of you, none of this would have happened!!!

:arrow: Update #2: From esc0rtd3w on the PS3 4.81 IDPS Dumper v0.2.1 (linked above), to quote:

We have some more exciting news to bring you!! (y)

We have been working very hard to bring eMMC support for the newest SuperSlims CECH-40xxA, CECH-42xxA , CECH-43xxA and that has happened. :D

The team would like to present a nice little update to the 4.81 IDPS Dumper now supporting eMMC hardware revision consoles!!

We also updated the instructions in the Readme.txt. Please read it... People who have issues triggering the exploit (>5mn) might have a low wifi connection that would explain the problem, in this case use ethernet or improve your WiFi.

Please report any issues you have while using this new version on any of the flash types, NAND, NOR, and eMMC. Here is an EMMC testing and research thread. Thank You to all :cool:

File: ps3_idps_dumper-v0.2.1-PS3XPloit.zip
MD5 Hash: 71268E3829CB78D818E8E0DE890E4140
SHA-256 Hash: BCE1AB277804BE7540286D9106FE58AFA231696F4174053C611DB5A18048CB71


:arrow: Update #3: From bguerville on the PS3 4.81 IDPS Dumper v0.2.1a (linked above), to quote:

I posted a 0.2.1a version to fix the include file error on index.html in OP.

File: ps3_idps_dumper-v0.2.1a-PS3XPloit.zip
MD5 Hash: 0fbb98452596c56c102e9b2d3b47c654
SHA-256 Hash: 58d049bf429d130556bf2687d445fdbe1c760981f42aa19f38da6e2a6ff70cb9


:arrow: Update #4: From bguerville on the PS3 4.81 / 4.82 IDPS Dumper v0.2.3 (linked above), to quote:

Project has been updated to 0.2.3. Check the OP... A 4.82 version has been tested on NOR/NAND/eMMC, it will be posted soon.

I updated the OP with a 4.82 release... Enjoy... :devilish:

File: ps3_idps_dumper-v0.2.3-PS3XPloit.zip
MD5 Hash: 97d8b44f25bbe65e801d00b6ec784ff4
SHA-256 Hash: e7dec93e584bec460fbb932333a2a14e34281bb1658ba291cd8f6dfebc1f9446

File: ps3_idps_dumper-v0-2-3-ps3xploit-4-82-zip
MD5 Hash: e381236f78a7ff9cc31f671d0d09be83
SHA-256 Hash: f96edcf36f94693e4957d9e844a24709edab247147dd468a915896434640ee68

File: ps3_idps_dumper-v0.2.3-PS3XPloit.zip (Updated)
MD5 Hash: 71dd906e585bf470f84f9d4fb10c1f37
SHA-256 Hash: d4bffe2b7d08c1dda275590229f86903f1db487e9a78364d6a025c3734cd8f68

File: ps3_idps_dumper-v0-2-3-ps3xploit-4-82-zip (Updated)
MD5 Hash: 3c2e1582f52e1002a12ad280f426d0c6
SHA-256 Hash: 1c49eabd64275171a60c90f0f06f503b7055f4ff863f87e7960d41464d127443


Changelog:

v0.2.3
  • Added 4.82 Support
  • Removed all extra requirements like JQuery..
  • Removed the need for string relocations to improve the initial memory search process & overall trigger times.
v0.2.1a
  • Added eMMC SuperSlim Support (CECH-40xxA, CECH-42xxA , CECH-43xxA)
  • Misc Tweaks To Exploit
  • Small typo on index.html pointed out by Turranius - Fixed
v0.2.1
  • Added eMMC SuperSlim Support (CECH-40xxA, CECH-42xxA , CECH-43xxA)
  • Misc Tweaks To Exploit
v0.2
  • The AfterLeak Version
v0.1
  • NOT RELEASED
4.81 IDPS Dumper
PS3 xploid work version 4.81- 4.82 idps extract by sc0rtd3w idps dumper 0.2.3 release!!!
[PS3 Debugging/ROP] System Call Test #1: sys_ss_get_open_psid
From the video caption, to quote: This is the first video in a series of videos I will be uploading demonstrating exploiting the PS3 using the debugger and ROP techniques. Don't get too excited, nothing will be shown here that hinders current private development progress, but this will give other users not familiar with these techniques a chance to play around a bit ;)

Thanks to @B7U3 C50SS in the PSXHAX Shoutbox for the heads-up on this exciting PlayStation 3 scene news! :thumbup:
PS3Xploit PS3 4.81 Exploit, Downgrader & 4.81 IDPS Dumper Updates.jpg
 

Comments

I understand that superslim owners won't be able to downgrade or flash custom firmware in the future? Am I right? It'd be very nice if someone replies (n)
On Superslim models like me, we only can expect only an exploit that can dump the CFW and patch it in the ram. Something like the HEN exploit from psp's and ps vita.

Not in the future with the update function or the E3-Flasher, that is the reason for the flash dumper, it will allow this over the webbrowser
the only think that allows that dumper its to read (ONLY) and extract a small part from the nand or nor memory of our PS3 using a webkit exploit. esc0rtd3w has taked advantage from that and he programmed the dumper to extract exactly the idps.bin from our flash memories. I'll be investigate the source code if i can change what we can extract from our ps3... like lv0.2 to study it and see how we can bypass it..

SO I HAVE AN OLD PS3 LIKE THE 1ST ONE THAT CAME OUT... can this idps dumper be used to put CFW on it.. its currently on 4.81 i believe its a CECH A???

sorry i just dont get all this technical stuff but if it is possible to get the CFW on it i will surely figure it out... i get sort of what the idps dumper is then im guessing we inject something into the log or whatever comes out and inject it back into the ps3?

is the writable part done yet or are we still waiting for this/? sorry for the noob questions and thank you all again SO MUCH to all involved in this project. you guys are literally like heroes to me
Its seems to be dangerous for now to write on the flash of our console... so the esc0rtd3w team is working on that or i hope they are... if you have a FAT version you're lucky because you will can install a fully CFW if at least it is released... not the same lucky for who has a late 2010 or above that needs to inicialize the exploit every time they power on the console.
 
@Simo Gareth yes, that is kinda the situation. The IDPS Dumper only extracts unique console ID to file, nothing more. The next expected release of the Flash Dumper will dump the full flash memory from all consoles (256MB NAND, 16MB NOR, 12GB eMMC models) to a bin file.

The BIG project is not expected until early next year and will write to flash memory a payload that you can then directly install CFW after without downgrade on all 25xx and below consoles. After that we have other tools that will be included in some sort of All-In-One toolkit of sorts. :p

Then onto the 3xxx and 4xxx HEN type of research and development sometime next year :D
 
If someone want to help me and have a fully unlocked PS3. I need documentation and info about how the late ps3 slims and superslims boots up, and how the directorys and filesystem works and his hierarchy. I think the community have to focus on what we can do with the bootloader and effectively how we can modify that... because the bootloader surely calls all critical and security files like lv0.2 to verify that the os its trying to run the console its legit and his filesystem is consistent.
 
we had to bring in the big guns on this one, and we have several well known devs in the community that are helping getting all of this working. So a HUGE THANK YOU to all of them as well (y)
 
I dont understand the js script used to dump the flash... You accesed to it from the address memory? so you put to the script the address memory and the exploit bloats the idps.bin?
 
@Simo Gareth yes, that is kinda the situation. The IDPS Dumper only extracts unique console ID to file, nothing more. The next expected release of the Flash Dumper will dump the full flash memory from all consoles (256MB NAND, 16MB NOR, 12GB eMMC models) to a bin file.

The BIG project is not expected until early next year and will write to flash memory a payload that you can then directly install CFW after without downgrade on all 25xx and below consoles. After that we have other tools that will be included in some sort of All-In-One toolkit of sorts. :p

Then onto the 3xxx and 4xxx HEN type of research and development sometime next year :D
as we can read previous post on this thread most of the people want to bypass cfw to ofw dtu method by injecting games with their idps though it can not be done on ofw 4.81 or above.

so can you make an another exploit with read and write access to devhdd0/game folder so one can easily install converted games on his ofw console. it will be a big xmas gift for us :D more than idps dumper and flash dumper.
 
That's no research for backups its a research to know how to bypass or avoid the system security, untethering the console to have full access to the hw and to restore that hw if bricks.
 
Status
Not open for further replies.
Back
Top