[source: xorloser @ xorloser.com] As I’m sure everybody heard, the memory access exploit for the PS3 hypervisor was released recently by geohot. I was finally able to replicate his hack so I thought I’d take the time to help out others who may also have trouble due to being linux n00bs like me :) If I were to post everything at once it would be too much work and I’d never get around to it, so I’ll post bits at a time to ensure I actually do post it heh. Today’s post will talk about the software side of the exploit.
Please note that the geohot exploit software was hardcoded for the v2.42 firmware, I have made a small fix that attempts to dynamically support all firmware versions. I have only tested and used it on v3.15 however.
The first step is to install Linux on your PS3 which means of course that this will not work on a slim PS3. I tried a few different Linux distros and after various different issues I settled on using Ubuntu v8.10 since this is the same version that geohot used. I suggest using the “alternate” version since it includes a gui which the “server” version does not. You can download the 636MB image below, I suggest using the legal torrent below to save the bandwith of the Ubuntu servers.
After downloading, burn the image to a CD-R and install as you would any OtherOS install. There are many generic and also Ubuntu specific guides for doing this, so I won’t cover that here.
Once you have Linux up and running you should log in using the username you created during install. Now open a terminal (Applications->Accessories->Terminal). You can enable the root account by creating a password for it by typing "sudo passwd". You then enter your current users password once and then the new root password twice. The root account will now be usable.
Now type "su" and then enter the new root password to get root access. Create a dir to put everything in. You could probably create this in your home directory, but I created it in the root of the filesystem so that I can share it between root and my user account as well as setting up access to it via samba from my PC. To create the dir do "mkdir /ps3share", you can call it anything you want, I call it ps3share because I share it with my PC over samba. Now allow all users to read and write to it by doing "chmod a+rw /ps3share". Finally give ownership of it to your normal user account by doing "chown username:username /ps3share" where username is your username.
Next you need to get the "fixed" exploit software onto your PS3. Using a USB flashdrive is easiest. Copy the extracted files onto it from your PC, then insert it into your PS3. It should automount and bring up an icon on your desktop. Double click the icon to open the file browser. Right click on the USB drive in the filebrowser and choose to "Open in New Window". Then on the left side of the file browser select "File System" and then "ps3share". Now drag the files from the USB drive into your "ps3share" directory.
I have included a binary of the exploit file for those of you who don’t want to build it yourself, but for those who do here is how. First you need to fix the location of the kernel headers so they can be found by the build scripts, so do "mv /usr/src/linux-ports-headers-2.6.25-2/ /usr/src/linux-headers-2.6.25-2/". Now change to the directory with the exploit source in it "cd /ps3share/ps3_exploit_fixed/src" and then build it by typing “make”. There will be a lot of warnings but it should create the file "exploit.ko".
You are now set to run the software side of the exploit. DO NOT run it from this terminal while in the GUI, it should only be run from console mode. If you do run it you will not see anything happening, but your PS3 will suddenly become really slow and you will have to turn it off. More about the running of it in a future post. A summary of the commands to enter at the terminal is below:
(then enter users password once, then the new password for root twice)