A9VG电玩部落论坛

 找回密码
 注册
搜索
查看: 1202|回复: 1

各种大神,求鉴定,dump LV0的方法

[复制链接]

精华
0
帖子
306
威望
0 点
积分
324 点
种子
5 点
注册时间
2009-3-29
最后登录
2023-4-24
 楼主| 发表于 2011-12-3 14:46  ·  美国 | 显示全部楼层 |阅读模式
我刚刚逛PS3HAX论坛的时候发现的

the bootldr holds the lv0 yes, the lv0 encapsulate the other ldrs (lv1, lv2, appldr, rvkldr, isoldr, ect.); sense 3.56^. But usually the chain of trust would go like metldr>other ldrs, and the metldr would run the loaders. But after 3.55 the lv0 has been copy the ldrs to the Ram then they are given to the metldr to exucute with out ever being held by the metldr. Now if you use a kernal module you can map out the ps3 real memory Using hardware you can dump Ram. By dumping the ram your getting a decrypted version of lv0 with all the ldrs in it. And you got keys.

Concept in boot order.

Cell INIT-> get encrypted bootldr off NAND/NOR flash, then the Ram will Initialises. This is when it will load the bootldr into a isolated spu, secure boot will decrypt the bootldr and verifies and executes. Now this is where the magic happens. Now the bootldr will decrypt the lv0 and it will get copy to the Ram (With loaders) before the Ram will run the loaders to the metldr


The metldr will always have to boot the ldrs too cause it is per console encrypted sony cant go change that out of no where.


Read more: http://www.ps3hax.net/showthread ... 94289#ixzz1fS3sxjSW

精华
0
帖子
559
威望
0 点
积分
589 点
种子
5 点
注册时间
2011-2-15
最后登录
2016-2-9
发表于 2011-12-3 16:34  ·  山东 | 显示全部楼层
貌似帖子很新。dump方法应该跟之前提出的差不多,需要用特殊的硬件在RAM上提取。个人认为比较困难。
您需要登录后才可以回帖 登录 | 注册

本版积分规则

Archiver|手机版|A9VG电玩部落 川公网安备 51019002005286号

GMT+8, 2024-12-4 04:38 , Processed in 0.126022 second(s), 11 queries , Redis On.

Powered by Discuz! X3.4

Copyright © 2001-2020, Tencent Cloud.

返回顶部