Post Reply 
PSJailbreak reverse engineered, it's actually a unique exploit
Author Message
Mr. Shizzy
ɯɹ˙ sɥızzʎ

Posts: 2,973.4020
Threads: 415
Joined: 21st Feb 2007
Reputation: -2.36574
E-Pigs: 160.1496
Offline
Post: #1
PSJailbreak reverse engineered, it's actually a unique exploit
[Image: 2m64kzl.jpg]
64Byte static data that is emulated by Jig sent to the PS3

The guys at GameFreax have managed to 'reverse engineer' PSJailbreak and the most interesting discovery is that it is far more than a clone of Sony's repair property. According to reports, it is a self-made exploit by the team which will be sure to surprise a whole lot of people. The technical break-down also gives some great insight into how it all functions. Although in another 'shock', the analysis seems to indicate that the product won't allow users to update it unless they have some special hardware.

You can read the translated version at GameFreax.com

And even more info:

Quote:Wee have the dongle PSJailbreak yet again brought out of retirement to put it more precisely Herbs to take a closer look. Wee tell you here in brief the main steps of the internal process of PSJailbreak.

Wee can confirm that it can not confirm that PSJailbreak a clone of Sony's "Jig" is module.  PSJailbrak is an exploit honest self-developed.  The chip is not but a PIC18F444 ATMega with software USB.  This means the chip is internally capable of USB to emulate.

PSJailbreak mainly be emulated 6Port a USB hub connected to a specific end USB devices and then disconnected.  One of these devices has the ID of Sony's "Jig" module, which means that played in the development of PSJailbreaks the "Jig" module, a certain role.

But let's start at the front: When the PS3 is clamped in the USB emulation device, which has a much too big Configuration Descriptor.  This Descriptor the stack with a PowerPC contained code that is executed.  Now, various USB devices are connected in the emulation.  A device has a large 0xAD Descriptor, which is part of the exploit and contains static data.  A short time later the jig module is connected, and encrypted data are transmitted to the module jig.  A  eternity later, the answers Jig 64Byte module with static data, all USB devices are disconnected, a new USB device is connected and the PS3 launches with a new look.

Incidentally PSJailbreak is NOT updateable. The Update feature can be mentioned, if realized at all, only with additional hardware.

PSP 2001 [TA-088v2]: 6.39 ME-9.7
[Image: 4kly6c1.gif]
Sig by Mr_Nick666
(This post was last modified: 26/08/2010 07:53 PM by Mr. Shizzy.)
26/08/2010 07:52 PM
Find all posts by this user Quote this message in a reply
Post Reply 


Messages In This Thread
PSJailbreak reverse engineered, it's actually a unique exploit - Mr. Shizzy - 26/08/2010 07:52 PM

Forum Jump:


User(s) browsing this thread: 1 Guest(s)

 Quick Theme: