Dumping Bootldr: Difference between revisions

From PS3 Developer wiki
Jump to navigation Jump to search
(Attempt to create a good tutorial in how to make a bootldr dump)
Line 10: Line 10:
==How to==
==How to==


* Start a normal session from red ribbon (or any other distro you might have)
<ol>
* Extract the contents of bootldrexploit to your home folder
<li>Start a normal session from red ribbon (or any other distro you might have)</li>
* Open your terminal and type as root:
<li>Extract the contents of bootldrexploit to your home folder</li>
<li>Open your terminal and type as root:</li>
 
{{keyboard|content=cd bootldrexploit/ps3peekpoke}}
{{keyboard|content=cd bootldrexploit/ps3peekpoke}}
* Compile the lv1 peek poke kernel module:
 
<li>Compile the lv1 peek poke kernel module:</li>
 
{{keyboard|content=make}}
{{keyboard|content=make}}
* Insert the lv1 peek poke kernel module:
 
<li>Insert the lv1 peek poke kernel module:</li>
 
{{keyboard|content=insmod ps3peekpoke.ko}}
{{keyboard|content=insmod ps3peekpoke.ko}}
<li>Change directory to the exploit dir</li>
{{keyboard|content=cd ../btldr8}}
{{keyboard|content=cd ../btldr8}}
* Compile the exploit
 
<li>Compile the exploit</li>
 
{{keyboard|content=make}}
{{keyboard|content=make}}
* Make a nor dump by typing
 
<li>Make a nor dump by typing</li>
 
{{keyboard|content=dd if=/dev/ps3nflasha of=nor.bin bs=1024}}
{{keyboard|content=dd if=/dev/ps3nflasha of=nor.bin bs=1024}}
* Execute the exploit
 
<li>Execute the exploit</li>
 
{{keyboard|content=./lv0Decrypt 0 nor.bin buffer.bin}}
{{keyboard|content=./lv0Decrypt 0 nor.bin buffer.bin}}
* It should show the status as status A0082. This means you've succeeded. check your dump for the keys.
 
<li>It should show the status as status A0082. This means you've succeeded. check your dump for the keys.</li>
 
{{keyboard|content=hexdump -C dump.bin > test}}
{{keyboard|content=hexdump -C dump.bin > test}}
{{keyboard|content=nano test}}
{{keyboard|content=nano test}}


* copy your dump to a safe place
</ol>

Revision as of 16:52, 8 November 2012

Requirements

  • OtherOS++ with SS Patches
  • Linux Kernel with glevand's/graf's patches (red ribbon rc6 will do the trick, since it has the embedded kernel)
  • https://dl.dropbox.com/u/35197530/bootldrexploit.7z the exploit and the lv1 peek poke from Juan (already corrected in this case)
  • NOR console with a NOR dump (the exploit isn't adapted to NAND consoles yet)

How to

  1. Start a normal session from red ribbon (or any other distro you might have)
  2. Extract the contents of bootldrexploit to your home folder
  3. Open your terminal and type as root:
  4. Type This
    cd bootldrexploit/ps3peekpoke
  5. Compile the lv1 peek poke kernel module:
  6. Type This
    make
  7. Insert the lv1 peek poke kernel module:
  8. Type This
    insmod ps3peekpoke.ko
  9. Change directory to the exploit dir
  10. Type This
    cd ../btldr8
  11. Compile the exploit
  12. Type This
    make
  13. Make a nor dump by typing
  14. Type This
    dd if=/dev/ps3nflasha of=nor.bin bs=1024
  15. Execute the exploit
  16. Type This
    ./lv0Decrypt 0 nor.bin buffer.bin
  17. It should show the status as status A0082. This means you've succeeded. check your dump for the keys.
  18. Type This
    hexdump -C dump.bin > test
    Type This
    nano test