Post: Spoofing - Some facts
02-24-2011, 11:56 AM #1
(adsbygoogle = window.adsbygoogle || []).push({}); So some think they are safe now with only using the cfw spoof in combination with either f...psn or charles.

Well you are not.

The only thing that is spoofed is the fw version reported to the authentication server, but your ps3 is not only connecting to that server.
Every other connection you make (http and https) will also reveal your real fw version witch is contained in the user-agent header.
Part from that, every time you launch any app on your ps3 it will request and xml from one of the Sony servers.
The file requested is the gameid-ver.xml
( eg: You must login or register to view this content. )

Sony is not that stupid and they also created these xmls for all known homebrew like binddev, multiman, ...
( You must login or register to view this content. for multiman )

You will also need to spoof that with for example an official game you have. The disadvantage is that if you launch an app, and request the wrong xml, you are logged off from psn.

This amongst several other connections and data requested and send need to be spoofed in order to be "hidden"

You will also need to replace several certificates on the ps3 before you can actually decrypt many of the ssl connections.

But still, in order to spoof correctly one will also need to know the information that is send from a OFW 3.56. As it is most likely not only the fw version is different but some headers may have another value, or even new headers exist.

I'm NOT going to make a full tutorial on how to do this, if you are smart enough google can help you.

In short: As long there is no decrypted version of ofw 3.56 or any following, you might be able to trick the logon server in order to logon to PSN, but you will never be able to trick Sony in thinking you have the correct FW.

The following 2 users say thank you to penguin_be for this useful post:

vipervimal, Xcellerator
02-24-2011, 04:28 PM #11
skeezymofo
Pokemon Trainer
Yeah IF I wasn't busy with school studies I would have the time to learn.I have basic knowledge in a few of these but this is still over my head.
I was gonna try just installing different certs and see what that did,but I think I'll just leave it alone.
02-24-2011, 04:38 PM #12
I think when you go to school you have much more time to learn and play with all this than when you go out working and have a family.
No excuse there...

Read something about encryption and ssl traffic, you'll then know that what you thought was a bad idea Winky Winky

---------- Post added at 11:38 AM ---------- Previous post was at 11:35 AM ----------

BTW, I'm not saying I'm an expert in all what I mentioned, there are many more that know much more about this than me
02-24-2011, 04:41 PM #13
skeezymofo
Pokemon Trainer
Originally posted by be View Post
I think when you go to school you have much more time to learn and play with all this than when you go out working and have a family.
No excuse there...

Read something about encryption and ssl traffic, you'll then know that what you thought was a bad idea Winky Winky

---------- Post added at 11:38 AM ---------- Previous post was at 11:35 AM ----------

BTW, I'm not saying I'm an expert in all what I mentioned, there are many more that know much more about this than me

Yeah I work go to school and have a wife,no little one yet,I guess here and there i can read up on it.
02-24-2011, 04:56 PM #14
this is why i disable my internet connection everytime i run homebrew
02-24-2011, 05:00 PM #15
zxz0O0
Are you high?
Im always monitoring the traffic and I have never seen my ps3 requesting the xml file for multiMan. Always for the last game I played. Sony doesnt have the ressources to check and ban for CFW (yet).
02-24-2011, 05:13 PM #16
Ok....

And what are you monitoring and how?

Did you actually clicked on the link I posted BEFORE you posted this reply?

Sony can start to ban automatically the moment you put your cfw or jailbroken ps3 on the net.
Why they have not done it yet? I don't know...

Copyright © 2024, NextGenUpdate.
All Rights Reserved.

Gray NextGenUpdate Logo