- 精华
- 0
- 帖子
- 59
- 威望
- 0 点
- 积分
- 59 点
- 种子
- 0 点
- 注册时间
- 2009-4-6
- 最后登录
- 2020-1-21
|
靠 那个iphone小子是nb 连fpga都用上了 目的是来产生40ns脉冲信号
我虽然有fpga的开发板(小弟电子系研究生),用fpga产生40ns脉冲相当容易(那小子就是按一下开发板上button 产生脉冲的 估计) 但 这个破解也太初步及原始了 最大的原因是要借助otheros(slim貌似不能装linux了) 飞线也多 (绕开某个芯片?)这个也不大靠谱 仅仅靠此能读写ram
但我觉得问题在于bootable和蓝光的密钥问题 而且软件难度比较大 也就是说 短时间内不大可能
呵呵 自己再研究研究
送上他博客“官方”破解步骤 简单英文 估计都能懂
Geohot has released his PS3 exploit to the masses… This particular exploit is for research purposes only; it won’t serve the average user any real purpose. So now it’s on you — all you hardcores out there.
A couple things you should know:
1.You need a non-Slim PS3;
2.You need OtherOS installed.
Once you’ve loaded whatever Linux distro with OtherOS, you’re all set… Download the exploit below and:
Compile and run the kernel module.
When the “PRESS THE BUTTON IN THE MIDDLE OF THIS” comes on, pulse the line circled in the picture low for ~40ns.
Try this multiple times, I rigged an FPGA button to send the pulse.
Sometimes it kernel panics, sometimes it lv1 panics, but sometimes you get the exploit!!
If the module exits, you are now exploited.
This adds two new HV calls,
u64 lv1_peek(16)(u64 address)
void lv1_poke(20)(u64 address, u64 data)
which allow any access to real memory.
The PS3 is hacked, its your job to figure out something useful to do with it.
大家等hello world 吧
补充 就像他自己说的那样 这个破解靠sony升级firmware很难屏蔽掉. |
|