|
PSP firmware v3.10 Already Decrypted by Team C + D
Well that didn't take long did it now? Team C + D have decrypted PSP firmware v3.10 in less than 24 hours!
quote:
$ony lost another batle and will loose the war! Here is the 3.10 decrypter on a day-0 release!
|
|
다크알렉스 & C + D 팀에 의해서 3.10펌웨어가 24시간도 안지나서 해킹되었습니다.
암호해독이 되었으니 관련 커펌이 나오는 건 시간 문제 겠네요.
첨부파일은 디크립트된 파일이구요.
밑에 코드는 3.10관련 암호해독 소스ㅡ부분만 보기쉽게 추출해 보았습니다.
이렇게 빨리 뚫리다니.. 소니 펌웨어 관계자 퇴출 당할듯;;
/* kernel modules 3.10 */
u8 keys310_0[0x10] =
{
0xa2, 0x41, 0xe8, 0x39, 0x66, 0x5b, 0xfa, 0xbb,
0x1b, 0x2d, 0x6e, 0x0e, 0x33, 0xe5, 0xd7, 0x3f
};
/* user modules 3.10 */
u8 keys310_1[0x10] =
{
0xA4, 0x60, 0x8F, 0xAB, 0xAB, 0xDE, 0xA5, 0x65,
0x5D, 0x43, 0x3A, 0xD1, 0x5E, 0xC3, 0xFF, 0xEA
};
/* vshmain 3.10 */
u8 keys310_2[0x10] =
{
0xE7, 0x5C, 0x85, 0x7A, 0x59, 0xB4, 0xE3, 0x1D,
0xD0, 0x9E, 0xCE, 0xC2, 0xD6, 0xD4, 0xBD, 0x2B
};
/* reboot.bin 3.10 */
u8 keys310_3[0x10] =
{
0x2E, 0x00, 0xF6, 0xF7, 0x52, 0xCF, 0x95, 0x5A,
0xA1, 0x26, 0xB4, 0x84, 0x9B, 0x58, 0x76, 0x2F
};
typedef struct
{
u32 tag; // 4 byte value at offset 0xD0 in the PRX file
u8 *key; // 16 bytes keys
u8 code; // code for scramble
} TAG_INFO2;
static TAG_INFO2 g_tagInfo2[] =
{
{ 0xcfef09f0, keys310_0, 0x62 },
{ 0x457b08f0, keys310_1, 0x5B },
{ 0x380208F0, keys310_2, 0x5A },
{ 0xcfef08f0, keys310_3, 0x62 },
{ 0xCFEF07F0, keys303_0, 0x62 },
{ 0xCFEF06F0, keys300_0, 0x62 },
{ 0x457B06F0, keys300_1, 0x5B },
{ 0x380206F0, keys300_2, 0x5A },
{ 0xCFEF05F0, keys280_0, 0x62 },
{ 0x457B05F0, keys280_1, 0x5B },
{ 0x380205F0, keys280_2, 0x5A },
{ 0x16D59E03, keys260_0, 0x62 },
{ 0x76202403, keys260_1, 0x5B },
{ 0x0F037303, keys260_2, 0x5A }
|