Post: Decrypt Or Dump LV0 For 3.60 CFW+ Exploit – Mathieulh
03-28-2011, 08:15 PM #1
kyskidz
Big Sister
(adsbygoogle = window.adsbygoogle || []).push({}); You must login or register to view this content.
We’ve seen countless times that Mathieulh trying to give the scene all the hints he can, but this time, he pretty much telling you peeps the real deal way to the exploit that we’ve been yearning of all this time

Originally posted by another user
@xShadow125 You can update from your pwn pup only from 3.55 or lower, unless you have an exploit.

@xShadow125 Of course that should be fixed in upcoming lv0 revisions anyway (By moving the ldrs to the top of lv0)

@xShadow125 You run the 3.60 lv0, then you switch the nor, and pull the cell reset line, and you dump the extra KBs where the loaders are.

@xShadow125 Basically you have a nor with 3.55 (or lower) lv0 and your own small lv1 code that does the dump, and 3.60 lv0 on the other.

@xShadow125 You wont get all of lv0 but the part with the loaders shouldn’t be overwritten.

@xShadow125 You can actually get all the 3.60 keys/loaders without knowing lv0 keys by dumping lv0 from ram with dual nor and signed lv1.

To those planning on building a 3.56+ pup for whatever reason, the files attributes changed, the group and user ids for the files as well.

The new 3.56+ values for tarballs are the following: owner_id, “0000764″ group_id, “0000764″ owner, “tetsu” group, “tetsu” ustar, “ustar “

You can use fix_tar to use those new values. Use with caution.

By comparison, those are the pre-3.56 values. owner_id, “0001752″ group_id, “0001274″ owner, “pup_tool” group, “psnes” ustar, “ustar “

@Ps3WeOwnYoU You need to either decrypt or dump lv0, then you can get the encrypted loaders and decrypt them with the metldr key. Good luck.


So, to decrypt this LV0 thing, we need to get to know it better. In the latest blog post by rms, You must login or register to view this content. explained briefly what LV0 is in the console’s security

Originally posted by another user
Anyway, let’s really discuss something PS3 instead of my PC xD, let’s start with Lv0, the most unknown level of the PS3. Lv0 initializes PS3 base hardware such as PowerPC/PPU portion of Cell/BE, SPU isolation for asecure_loader, and gelic ethernet/WLAN device. Lv0 also proudly proclaims itself as the “Cell OS Bootloader”. In older firmwares, 0.80-ish to 3.56, Lv0 initialized SPU isolation on one of the SPUs, then it loaded and decrypted asecure_loader. Asecure_loader or metldr then decrypts the isolated loader, in this case, lv1ldr, then lv1ldr decrypts lv1.self. In 3.60 this changed. Lv0 now has all of the loaders integrated into it as one large fat binary. All the keys one needs such as Public ECDSA key/AES CBC key and Initialization Vector and ECDSA curve type are in there. Just go ahead and grab them if you can get the ldrs out of the binary.

So, unless you can decrypt Lv0, no 3.60 “CFW” for you . Is there any need for it anyway?


Mathieulh also has some facts to clarify about LV0

Originally posted by another user
1. lv0 isn’t a loader it’s a ppu binary

2. Lv0 isn’t encrypted per console and can be updated with the rest of the coreos

3. Lv0 is decrypted by the bootloader, there is no such thing as a lv0ldr.

4. The bootloader keys cannot be updated/modified on EXISTING hardware

5. lv0.2 is NOT a binary, it’s a new metadata for lv0 which is to be decrypted and verified by a new bootloader (which is to be available on future ps3s), it is NOT used by the current bootloader (and thus in current playstation 3 consoles)


But wait, messing with this thing could lead to the YLOD tragedy, unless you have those expensive NOR flasher you might want to proceed, and that’s according to rms again.

Originally posted by another user
Lv0 also does some more interesting stuff such as SPU mailbox handling, and eEID integrity checks. Lv0 also used to check for QA flag and proper token, that is now in a spu isolated self in Core OS. Now, if you did tamper with eEID, lv0 will panic out, and your console will then “YLOD”, and you’d need a flasher for your PS3 to recover


There you go, with all the information available out there i just wonder why didn’t anyone found the solution to the exploit that Mathieulh (and maybe some people we didn’t know) discovered weeks ago. Maybe instead of bitching why the guy did not release anything, try listening to what he said this time.


sourceYou must login or register to view this content.

The following 20 users say thank you to kyskidz for this useful post:

Arman M., basser1, chickensamw1993, cKyOne, djfatpickle, emersons35, gunhead88, jakeowns, juko18, khalids19, MajorPSP156, mrbonno, munirmaj, Press ►, PsYcHoSiS, Ryan_ward1, shaunyovls25, theycallmeryan, xRafiq-, yaro
03-28-2011, 08:21 PM #2
InSaNe-xPWEEx
a.k.a. PWEE21
good explination
03-28-2011, 08:27 PM #3
viralhysteria
74261700027
Wait, so basically, Lv0.2 doesn't even function yet?
03-28-2011, 08:29 PM #4
Thanks for this info .. it seems as there arent many people that have the knowledge to make a custom firmware.. but than again i may be wrong
03-28-2011, 08:31 PM #5
AMNE
Big Daddy
Originally posted by kyskidz View Post
You must login or register to view this content.
We’ve seen countless times that Mathieulh trying to give the scene all the hints he can, but this time, he pretty much telling you peeps the real deal way to the exploit that we’ve been yearning of all this time



So, to decrypt this LV0 thing, we need to get to know it better. In the latest blog post by rms, You must login or register to view this content. explained briefly what LV0 is in the console’s security



Mathieulh also has some facts to clarify about LV0



But wait, messing with this thing could lead to the YLOD tragedy, unless you have those expensive NOR flasher you might want to proceed, and that’s according to rms again.



There you go, with all the information available out there i just wonder why didn’t anyone found the solution to the exploit that Mathieulh (and maybe some people we didn’t know) discovered weeks ago. Maybe instead of bitching why the guy did not release anything, try listening to what he said this time.


sourceYou must login or register to view this content.


here some more info


Mathieulh Mathieulh
@
@Ps3WeOwnYoU You need to either decrypt or dump lv0, then you can get the encrypted loaders and decrypt them with the metldr key. Good luck.
1 hour ago Favorite Retweet Reply

Mathieulh Mathieulh
@
@Ps3WeOwnYoU You can't decrypt lv0 without the bootloader keys. Your best bet is to look at 3.56, decrypt loaders, look for exploits, profit
Last edited by AMNE ; 03-28-2011 at 08:36 PM.
03-28-2011, 08:32 PM #6
Cody_h4x
Nobody is like me
Originally posted by deRez View Post
Wait, so basically, Lv0.2 doesn't even function yet?


lv0.2 is a metatable for lv0, so yea it has functions Smile
Last edited by Cody_h4x ; 03-28-2011 at 08:36 PM.
03-28-2011, 08:32 PM #7
djfatpickle
Bounty hunter
yeah bro thanks.
03-28-2011, 08:33 PM #8
cKyOne
I am error
he did all the dirty work imo, now it's just a matter of days/weeks that a CFW comes through. I have hopes that ppl look past all the troling and flaming and actually start doing something.

The following user thanked cKyOne for this useful post:

iTruceFret
03-28-2011, 08:34 PM #9
viralhysteria
74261700027
Originally posted by h4x View Post
lv0.2 is a metatable for bootldr, so yea it has functions Smile


5. lv0.2 is NOT a binary, it’s a new metadata for lv0 which is to be decrypted and verified by a new bootloader (which is to be available on future ps3s), it is NOT used by the current bootloader (and thus in current playstation 3 consoles)
03-28-2011, 08:34 PM #10
xRafiq-
Pedobear
finally a neat forum that explains the lv0 thanks ill +rep you nw

Copyright © 2024, NextGenUpdate.
All Rights Reserved.

Gray NextGenUpdate Logo