The Dutch HackInfo

Information about Hacking, Security & Tweaking

Ps3 tweaking

1 1 1 1 1 1 1 1 1 1 Rating 2.50 (2 Votes)

playstation3Een team van hackers claimt de verificatiesleutels die door legitieme PlayStation 3-software gebruikt wordt, achterhaald te hebben. De hack zou het mogelijk moeten maken om bijvoorbeeld Linux op de nieuwste Slim-editie te draaien.

Een groep hackers die zich fail0verflow noemt heeft op het Chaos Communication Congress in Berlijn een nieuwe PlayStation 3-hack uit de doeken gedaan. De softwarekant van de PlayStation 3 bestaat uit een hypervisor waar een kernel bovenop draait. In oude systemen kon gekozen worden uit OtherOS voor Linux, of GameOS voor het draaien van spellen. Nieuwere firmwares bevatten OtherOS niet meer. Sony's keuze om de OtherOS-optie te verwijderen was voor de ontwikkelaars de aanleiding voor de hack.

Via een exploit in de usb-hardware wisten de hackers toegang te krijgen tot de laag waarop GameOS draait, en verving deze door het zelfgeschreven AsbestOS. Daarna wisten ze één van de bootloaders te kraken, waarna een lijst met verificatiesleutels gedumpt kon worden. Deze lijst is logischerwijs versleuteld, maar in deze encryptie heeft Sony een fout gemaakt die door de hackers als een 'epic fail' omschreven wordt. De gebruikte encryptieformule bevat een variabele m, die volledig willekeurig dient te zijn. In Sony's implementatie blijkt m altijd hetzelfde getal te zijn, waardoor de hackers de encryptie van de verificatiesleutels wisten te kraken.

De hack maakt het nog niet mogelijk om gekopieerde games te draaien, maar dat is ook niet het primaire doel, zeggen de hackers. Wel moet het nu mogelijk zijn om Linux op PlayStation 3's met nieuwe firmwares te draaien, waaronder de Slim-versie. De groep is van plan om later tijdens het congres een live demonstratie te geven van de hack, en hoopt binnen een maand alle tools vrij te kunnen geven.

1 1 1 1 1 1 1 1 1 1 Rating 1.00 (1 Vote)
playstation3[source: xorloser @ xorloser.com] As I’m sure everybody heard, the memory access exploit for the PS3 hypervisor was released recently by geohot. I was finally able to replicate his hack so I thought I’d take the time to help out others who may also have trouble due to being linux n00bs like me :) If I were to post everything at once it would be too much work and I’d never get around to it, so I’ll post bits at a time to ensure I actually do post it heh. Today’s post will talk about the software side of the exploit.

Please note that the geohot exploit software was hardcoded for the v2.42 firmware, I have made a small fix that attempts to dynamically support all firmware versions. I have only tested and used it on v3.15 however.

Fixed PS3 Exploit Files

The first step is to install Linux on your PS3 which means of course that this will not work on a slim PS3. I tried a few different Linux distros and after various different issues I settled on using Ubuntu v8.10 since this is the same version that geohot used. I suggest using the “alternate” version since it includes a gui which the “server” version does not. You can download the 636MB image below, I suggest using the legal torrent below to save the bandwith of the Ubuntu servers.

ubuntu for PS3 v8.10 alternate – Torrent

Ubuntu for PS3 v8.10 alternate – Direct Download

After downloading, burn the image to a CD-R and install as you would any OtherOS install. There are many generic and also Ubuntu specific guides for doing this, so I won’t cover that here.

Once you have Linux up and running you should log in using the username you created during install. Now open a terminal (Applications->Accessories->Terminal). You can enable the root account by creating a password for it by typing "sudo passwd". You then enter your current users password once and then the new root password twice. The root account will now be usable.

Now type "su" and then enter the new root password to get root access. Create a dir to put everything in. You could probably create this in your home directory, but I created it in the root of the filesystem so that I can share it between root and my user account as well as setting up access to it via samba from my PC. To create the dir do "mkdir /ps3share", you can call it anything you want, I call it ps3share because I share it with my PC over samba. Now allow all users to read and write to it by doing "chmod a+rw /ps3share". Finally give ownership of it to your normal user account by doing "chown username:username /ps3share" where username is your username.

Next you need to get the "fixed" exploit software onto your PS3. Using a USB flashdrive is easiest. Copy the extracted files onto it from your PC, then insert it into your PS3. It should automount and bring up an icon on your desktop. Double click the icon to open the file browser. Right click on the USB drive in the filebrowser and choose to "Open in New Window". Then on the left side of the file browser select "File System" and then "ps3share". Now drag the files from the USB drive into your "ps3share" directory.

I have included a binary of the exploit file for those of you who don’t want to build it yourself, but for those who do here is how. First you need to fix the location of the kernel headers so they can be found by the build scripts, so do "mv /usr/src/linux-ports-headers-2.6.25-2/ /usr/src/linux-headers-2.6.25-2/". Now change to the directory with the exploit source in it "cd /ps3share/ps3_exploit_fixed/src" and then build it by typing “make”. There will be a lot of warnings but it should create the file "exploit.ko".

You are now set to run the software side of the exploit. DO NOT run it from this terminal while in the GUI, it should only be run from console mode. If you do run it you will not see anything happening, but your PS3 will suddenly become really slow and you will have to turn it off. More about the running of it in a future post. A summary of the commands to enter at the terminal is below:

sudo password

(then enter users password once, then the new password for root twice)

su

(then enter root password)

mkdir /ps3share

chmod a+rw /ps3share

chown username:username /ps3share

(where username is replaced by your username)

Now copy the exploit files into /ps3share.

mv /usr/src/linux-ports-headers-2.6.25-2/ /usr/src/linux-headers-2.6.25-2/

cd /ps3share/ps3_exploit_fixed/src

make

done!


Copyright © 2021. All Rights Reserved.