Category PS4 Jailbreaking       Thread starter PSXHAX       Start date Dec 18, 2017 at 5:17 PM       27,842       17            
Status
Not open for further replies.
Since his recent PS4 Orbis Title Metadata Database release, PlayStation 4 developer @RedEyeX32 made available on Twitter a PS4 PKGDec homebrew tool used to decrypt encrypted entries within a package file container. :ninja:

In his Tweets below, he notes "The keys to decrypt these entry files are encrypted with RSA. I've provided the necessary keys but you will need to calculate the rest to make the tool useful."

Download: pkgdec.rar (86 KB) / Usage Details from Robbie Luong with Something Sinister's Tool

Also from him are some PS4 private and public key SHA-256 hashes, as the PlayStation 4 v1.76+ scene eagerly awaits further word of SpecterDev's progress on a public v4.05 kernel exploit that can be used to jailbreak newer PS4 console models.

Remove the last 16 bytes from the included keys within the source to get the actual 'key' of E, P, & Q.

To calculate public key: n = q * p
To calculate private key: d = e^-1 mod ((p - 1) * (q - 1))
Code:
Private key SHA-256: a9ac2702937c953ce42a85fae1d3914443a4859fed76140126d8d52ab2778caf
Public key SHA-256: c80fecd0f96b5f06135505d9056794117697c3b2848c89fdf370e087ea3e6237
And from @RedEyeX32 on Discord: This is the most important entry types since those are the encrypted ones:
Code:
ENTRY_TYPE_ENTRY_KEYS          = 0x0010
ENTRY_TYPE_IMAGE_KEY           = 0x0020
ENTRY_TYPE_GENERAL_HASHES      = 0x0080
From Hastebin.com via @tunip3 (ps4publickey.bin and ps4privatekey.bin):
Code:
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
Finally, from modrobert (also via shellcore): Getting the public key was easy enough, but the private key took a bit of head scratching and Python magic.

Public key:
Code:
0xd2, 0x12, 0xfc, 0x33, 0x5f, 0x6d, 0xdb, 0x83, 0x16, 0x09, 0x62, 0x8b,
0x03, 0x56, 0x27, 0x37, 0x82, 0xd4, 0x77, 0x85, 0x35, 0x29, 0x39, 0x2d,
0x52, 0x6b, 0x8c, 0x4c, 0x8c, 0xfb, 0x06, 0xc1, 0x84, 0x5b, 0xe7, 0xd4,
0xf7, 0xbc, 0xd2, 0x4e, 0x62, 0x45, 0xcd, 0x2a, 0xbb, 0xd7, 0x77, 0x76,
0x45, 0x36, 0x55, 0x27, 0x3f, 0xb3, 0xf5, 0xf9, 0x8e, 0xda, 0x4b, 0xef,
0xaa, 0x59, 0xae, 0xb3, 0x9b, 0xea, 0x54, 0x98, 0xd2, 0x06, 0x32, 0x6a,
0x58, 0x31, 0x2a, 0xe0, 0xd4, 0x4f, 0x90, 0xb5, 0x0a, 0x7d, 0xec, 0xf4,
0x3a, 0x9c, 0x52, 0x67, 0x2d, 0x99, 0x31, 0x8e, 0x0c, 0x43, 0xe6, 0x82,
0xfe, 0x07, 0x46, 0xe1, 0x2e, 0x50, 0xd4, 0x1f, 0x2d, 0x2f, 0x7e, 0xd9,
0x08, 0xba, 0x06, 0xb3, 0xbf, 0x2e, 0x20, 0x3f, 0x4e, 0x3f, 0xfe, 0x44,
0xff, 0xaa, 0x50, 0x43, 0x57, 0x91, 0x69, 0x94, 0x49, 0x15, 0x82, 0x82,
0xe4, 0x0f, 0x4c, 0x8d, 0x9d, 0x2c, 0xc9, 0x5b, 0x1d, 0x64, 0xbf, 0x88,
0x8b, 0xd4, 0xc5, 0x94, 0xe7, 0x65, 0x47, 0x84, 0x1e, 0xe5, 0x79, 0x10,
0xfb, 0x98, 0x93, 0x47, 0xb9, 0x7d, 0x85, 0x12, 0xa6, 0x40, 0x98, 0x2c,
0xf7, 0x92, 0xbc, 0x95, 0x19, 0x32, 0xed, 0xe8, 0x90, 0x56, 0x0d, 0x65,
0xc1, 0xaa, 0x78, 0xc6, 0x2e, 0x54, 0xfd, 0x5f, 0x54, 0xa1, 0xf6, 0x7e,
0xe5, 0xe0, 0x5f, 0x61, 0xc1, 0x20, 0xb4, 0xb9, 0xb4, 0x33, 0x08, 0x70,
0xe4, 0xdf, 0x89, 0x56, 0xed, 0x01, 0x29, 0x46, 0x77, 0x5f, 0x8c, 0xb8,
0xa9, 0xf5, 0x1e, 0x2e, 0xb3, 0xb9, 0xbf, 0xe0, 0x09, 0xb7, 0x8d, 0x28,
0xd4, 0xa6, 0xc3, 0xb8, 0x1e, 0x1f, 0x07, 0xeb, 0xb4, 0x12, 0x0b, 0x95,
0xb8, 0x85, 0x30, 0xfd, 0xdc, 0x39, 0x13, 0xd0, 0x7c, 0xdc, 0x8f, 0xed,
0xf9, 0xc9, 0xa3, 0xc1
Private key:
Code:
0x32, 0xd9, 0x03, 0x90, 0x8f, 0xbd, 0xb0, 0x8f, 0x57, 0x2b, 0x28, 0x5e,
0x0b, 0x8d, 0xb3, 0xea, 0x5c, 0xd1, 0x7e, 0xa8, 0x90, 0x88, 0x8c, 0xdd,
0x6a, 0x80, 0xbb, 0xb1, 0xdf, 0xc1, 0xf7, 0x0d, 0xaa, 0x32, 0xf0, 0xb7,
0x7c, 0xcb, 0x88, 0x80, 0x0e, 0x8b, 0x64, 0xb0, 0xbe, 0x4c, 0xd6, 0x0e,
0x9b, 0x8c, 0x1e, 0x2a, 0x64, 0xe1, 0xf3, 0x5c, 0xd7, 0x76, 0x01, 0x41,
0x5e, 0x93, 0x5c, 0x94, 0xfe, 0xdd, 0x46, 0x62, 0xc3, 0x1b, 0x5a, 0xe2,
0xa0, 0xbc, 0x2d, 0xeb, 0xc3, 0x98, 0x0a, 0xa7, 0xb7, 0x85, 0x69, 0x70,
0x68, 0x2b, 0x64, 0x4a, 0xb3, 0x1f, 0xcc, 0x7d, 0xdc, 0x7c, 0x26, 0xf4,
0x77, 0xf6, 0x5c, 0xf2, 0xae, 0x5a, 0x44, 0x2d, 0xd3, 0xab, 0x16, 0x62,
0x04, 0x19, 0xba, 0xfb, 0x90, 0xff, 0xe2, 0x30, 0x50, 0x89, 0x6e, 0xcb,
0x56, 0xb2, 0xeb, 0xc0, 0x91, 0x16, 0x92, 0x5e, 0x30, 0x8e, 0xae, 0xc7,
0x94, 0x5d, 0xfd, 0x35, 0xe1, 0x20, 0xf8, 0xad, 0x3e, 0xbc, 0x08, 0xbf,
0xc0, 0x36, 0x74, 0x9f, 0xd5, 0xbb, 0x52, 0x08, 0xfd, 0x06, 0x66, 0xf3,
0x7a, 0xb3, 0x04, 0xf4, 0x75, 0x29, 0x5d, 0xe9, 0x5f, 0xaa, 0x10, 0x30,
0xb2, 0x0f, 0x5a, 0x1a, 0xc1, 0x2a, 0xb3, 0xfe, 0xcb, 0x21, 0xad, 0x80,
0xec, 0x8f, 0x20, 0x09, 0x1c, 0xdb, 0xc5, 0x58, 0x94, 0xc2, 0x9c, 0xc6,
0xce, 0x82, 0x65, 0x3e, 0x57, 0x90, 0xbc, 0xa9, 0x8b, 0x06, 0xb4, 0xf0,
0x72, 0xf6, 0x77, 0xdf, 0x98, 0x64, 0xf1, 0xec, 0xfe, 0x37, 0x2d, 0xbc,
0xae, 0x8c, 0x08, 0x81, 0x1f, 0xc3, 0xc9, 0x89, 0x1a, 0xc7, 0x42, 0x82,
0x4b, 0x2e, 0xdc, 0x8e, 0x8d, 0x73, 0xce, 0xb1, 0xcc, 0x01, 0xd9, 0x08,
0x70, 0x87, 0x3c, 0x44, 0x08, 0xec, 0x49, 0x8f, 0x81, 0x5a, 0xe2, 0x40,
0xff, 0x77, 0xfc, 0x0d
Cheers to both @hyndrid and @raedoob in the PSXHAX Shoutbox and @SSShowmik on PSXHAX Discord for the news tips, and to @Nesterwork for the Acer MEME! :beer:
PS4 PKGDec Tool to Decrypt Encrypted Package Entries by RedEyeX32.jpg
 

Comments

Status
Not open for further replies.
Status
Not open for further replies.
Recent Articles
Resident Evil 3 Arrives with New PS4 Game Releases Next Week
Next week on April 3rd Resident Evil 3 arrives with the new PS4 video game releases where Jill Valentine witnesses the atrocities Umbrella performed in Raccoon City and as a result they unleash...
Random Content ID (CID) Generator for PS4 PKG Files by Backporter
Since his DDS Converter for PS4 Themes PlayStation 4 developer @Backporter returns this weekend via Twitter with a Random Content ID (CID) Generator that will generate a random Content ID for PS4...
Sony Announces End of PlayStation 3 (PS3) Partial Message Service
Proceeding their PS3 End of Production a few years back, Sony of Japan announced the end of PlayStation 3's partial message service as of June 30, 2020. ☠ This means message functions between...
PS4 .Env Decryptor: Python 2 Script for Decrypting Envelope Files
We've seen PS4 Envelope Files in Logs, the Decrypted sl-config.xml.env with Event Log Servers, some PS4 Envelope File Documentation earlier this week and today PlayStation 4 scene developer...
Top