Editing PSJailbreak Exploit Payload Reverse Engineering
Jump to navigation
Jump to search
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 1: | Line 1: | ||
= Writeup by | == Writeup by phyre == | ||
''' Source: phire at [https://web.archive.org/web/20120829232220/http://ps3wiki.lan.st/index.php/PSJailbreak_Exploit_Reverse_Engineering | ''' Source: phire at [https://web.archive.org/web/20120829232220/http://ps3wiki.lan.st/index.php/PSJailbreak_Exploit_Reverse_Engineering]''' | ||
---- | ---- | ||
Line 160: | Line 160: | ||
''If you have any information to add, feel free to edit this document or use the discussion page.'' | ''If you have any information to add, feel free to edit this document or use the discussion page.'' | ||
= Writeup by Mathieulh = | |||
== Writeup by Mathieulh == | |||
Here is my understanding of what the exploit payload does: | Here is my understanding of what the exploit payload does: | ||
Line 886: | Line 887: | ||
ROM:00000000007006E4 b memset # we exit by zeroing the payload in mem | ROM:00000000007006E4 b memset # we exit by zeroing the payload in mem | ||
ROM:00000000007006E4 # End of function exploit_main | ROM:00000000007006E4 # End of function exploit_main | ||
</pre> | |||
</pre> | |||
{{Custom Firmware}}<noinclude>[[Category:Main]]</noinclude> | {{Custom Firmware}}<noinclude>[[Category:Main]]</noinclude> |