Взлом ps3

Announcement

Features
  • Control the device from your phone/computer over Bluetooth/Wifi
  • Open API for developers to interact/control the device
  • Press physical buttons on the console
  • View/Download UART data
  • Add, download, or delete exploits with one button click
  • Custom filetype (Compresses exploits into a single file to install/share)
    • Supports both Bin and JS payloads
    • Includes application to compress/extract these files
    • This is to save space and add to ease of use
  • Web based firmware updates for this device (Need no physical access to device to update it)
  • Basic usage without soldering (No buttons or UART)
  • A secret feature that’ll be revealed after it’s working 100%
Hardware Info
  • USB-C port (Custom pinout for internal installation, but can just run off USB power)
  • SD card for exploit storage (GBs vs 3MB)
  • User Expandable
  • Custom Case for external use (Extender to turn a female USB-C to a male USB-A)
Testing process
  1. Software testing with ESP(8266/32) dev boards.
  2. Finish prototype PCB boards.
  3. Send out prototype boards. Will be a small batch, about 10 boards.
  4. «Finish» software, get feedback, make revisions to PCB as necessary.
  5. First batch of v1.0 boards. (Current bill of materials puts PCB cost @ $10 depending on interest, larger order sizes will make the board cheaper)
Beta Tester Info

It’s currently in a working state, just using the API, with majority of the features are done (Currently the bluetooth controller & the admin panel HTML+JS are not 100%) and I’ll be looking for testers (Bring your own board) within the next two week or so. Contact me on Twitter or Discord if your interested in testing.

To be a part of the first testing process you just need familiarity with the exploit process and familiarity with your ESP board (Be able to use the serial logger and flash the firmware).

To get one of the prototype boards soldering ability is a must. There are ~6 wires to solder, 2 of which being on the PS4 motherboard. I’ll eat the cost for the prototypes.

If there is demand for prototypes, I may make a bigger order and will send them out at cost or make a bigger PCB order and send out PCBs with the bill of materials.

PS3 HAN ACT/RIF Copier

This will write back a modified act.dat and *.rif file

** It is recommended to resign all the pkgs that require Han enabler **
** Packages which are converts and packages which needs rif activation **

  • Use habib’s resigner tool to resign rif and create new signed_act.dat
    Place act.dat in resigner directory and drag matching rap file onto exe
    Resigner Tool Repo: https://github.com/PS3Xploit/PS3xploit-resigner

  • Rename your new «signed_act.dat» to «act.dat» and place on USB drive
    ** keep original act.dat in a safe place **

  • Place new rif file on USB drive as well

  • Load Exploit Page

  • Change RIF File Name to match your target
    example PS2 Placeholder: 2P0001-PS2U10000_00-0000111122223333

  • Select Root Path where act.dat/*.rif is located (default /dev_usb000/)

  • Click «Initialize ACT/RIF Copier» button

  • When init ready, click «Copy Files» button to transfer to HDD

Changelog

  • Javascript/OSX Error fix by @alu0100845235
  • Switched back to by @artik
  • auto_exploit fix by @MoserB
  • Added HTTP_Port and Root_Check setting by @arioko
  • Added version in menu header by @arioko
  • Renamed setting to requested by @JanJastrow
  • Added arg to specify file location requested by xeroxmalf#7646
  • Updated README.md
  • Added FAQ.md
  • Add Host_Version into javascript object to use in themes
  • Add Lang_Code into javascript object, if available, to use in themes
  • Attempt to detect spoofer with default theme (New included HEN uses 5.51 spoofer… since 5.51 doesn’t exist, yet, it’s mapped to 4.55, likewise 5.05 is mapped to 4.05 as the full UA for 5.05 is blocked by default so if 5.05 is able to access the page it’s actually 4.05, be aware 4.05 support is dropped)
  • Fixed issue with menu not reopening after selecting «Don’t send a payload»
  • Renamed setting to
  • Renamed setting to
  • Added to settings
  • Removed warning on empty setting, the default, for
  • Remove unused patch payload function
  • Updated/Added payloads
  • Removed majority of 4.05 payloads from release
  • Add alias for URL while using DNS (Project likely being renamed due to the next bullets in this list and the announcement)
  • Nintendo Switch (3.0.0) support (Mostly Untested)
    • Block Updates with DNS
    • Redirect connection test
    • No exploit included (nx-hbexploit in next release)
  • PlayStation Vita (3.60) Support (Mostly Untested)
    • Blocks updates with DNS
    • Redirect User’s Manual
    • Updater support
    • No exploit included (Henkaku in next release)
  • More console support pending
  • Removed some update settings… I’ll build a standalone update deleter or something
  • THE UPDATER NO LONGER CHECKS MD5 CHECKSUMS
Добавить комментарий

Ваш адрес email не будет опубликован. Обязательные поля помечены *

Adblock
detector