SIG File Format: Difference between revisions
mNo edit summary |
CrashSerious (talk | contribs) |
||
Line 160: | Line 160: | ||
=== unsig - SIG File De-/Recrypter === | === unsig - SIG File De-/Recrypter === | ||
vote + download : http://psx-scene.com/forums/content/unsig-sig-file-decrypter-re-crypter-1771/ | vote + download : http://psx-scene.com/forums/content/unsig-sig-file-decrypter-re-crypter-1771/ | ||
=Files leaked by an0n= | |||
Objective suites creates files in the temp folder inside the Objective Suites folder where the EXE is ran whenever it processes teh commands in a sig file. This section attempts to unravel what these files are. | |||
==auth_0.txt== | |||
auth_0.txt is the MAC of '''a''' NIC, the JIG PC's used at the repair centers may very well be dual homed. One NIC for PS3 Communication and one for external communication. | |||
==auth_1_.txt== | |||
auth_1.txt is the MAC of '''another''' NIC, the JIG PC's used at the repair centers may very well be dual homed. One NIC for PS3 Communication and one for external communication. | |||
==auth_01.txt== | |||
This file is simply: | |||
auth_0.txt+auth_1.txt. | |||
==auth_10.txt== | |||
This file is simply: | |||
auth_1.txt+auth_0.txt |
Revision as of 06:41, 27 December 2011
Objects
Objects used by the .SIG files.
- TOOLKIT
- Unknown
- FILE
- A file operation, currently thought to be in the temp directory of the USB
- PS3PICSY
- Unknown, likely WWCS communications to a centralized server used at the factory or repair center.
- PS/2
- Likely from a barcode reader on COM1 with 9600,7,2,0,50,0,0,0,0 as settings.
- PS3LV2DIAG
- Functions in the LV2Diag
- EDIT
- Unknown
Functions
Functions called by the .SIG files, arranged by the objects that are available. Functions can have one, more, or no arguments (s_data, s_delim, r_data, and r_delim) associated with it.
The following syntax items have been noticed:
- for options, temp:xxxx where xxxx is a file name in the temp folder of the USB flash drive
- for options, xml:xxxx where xxxx is the .SIG file name (XML data set name)
- for options, a HEX number
- for options, two comma delimited values
- for other arguments, file://temp: for a file located in teh temp folder of the USB flash drive.
- for other arguments, a string to be displayed
TOOLKIT
- IsInit
- GetMacAddress
- MessageBox
- Exit
- GetDateTime
- CreateProcess
FILE
- Copy
- WriteRead
- Divide
- AsciiToBin
- MD5
- Length
- Erase
- AddC39M10W3
- Append
- GetProfileString
- AsciiToBinAscii
- Insert
- Operator
- Read
- HexToDec
PS3PICSY
- CheckWwcsAuthentication
- SetSessionId
- RequestWwcsJigData
- RequestLogisticsLabel
- RequestIdpsConfig
- RequestIdps
- RequestServerTime
- EntryWwcsLog
- RequestSetSerial
PS/2
- Read
PS3LV2DIAG
The functions available with this object will likely vary with the LV2DIAG used.
- Open
- WaitEvent
- ReadAscii
- WriteRead
- Close
- GetScErrLog
- UpdateSYSCON (Unleaked .SIG file in combination with a modified downgrade lv2diag)
EDIT
- Write
Tools useable for SIG files
ssleay32.dll patch
small ssleay32.dll patch for ObjectiveSuites (educational use only): http://www.sendspace.com/file/xoxehb
.SIG <> XLS
/* * sigtool.c * * Copyright (C) an0nym0us * * This software is distributed under the terms of the GNU General Public * License ("GPL") version 3, as published by the Free Software Foundation. * */ #include <stdio.h> #include <stdlib.h> #include <string.h> int main ( int argc, char *argv[] ) { int i = 0 ; FILE *src_file ; FILE *dst_file ; size_t buf_size = 0 ; char *src ; char *dst ; if (argc != 3) { fprintf(stderr, "usage: %s SOURCE_FILE.SIG DEST_FILE.XLS\n", argv[0]); return -1; } src_file = fopen ( argv[1], "rb" ) ; dst_file = fopen ( argv[2], "wb" ) ; fseek ( src_file, 0L, SEEK_END ) ; buf_size = ftell ( src_file ) ; fseek ( src_file, 0L, SEEK_SET ) ; src = malloc ( buf_size ) ; dst = malloc ( buf_size ) ; fread ( src, buf_size, 1, src_file ) ; for ( i = 0; i < buf_size; i++ ) { if ( src[i] >= 0x20 && src[i] <= 0x7e ) { dst[i] = (char)0x9e - (char)src[i] ; } else { dst[i] = (char)src[i] ; } } fwrite ( dst, buf_size, 1, dst_file ) ; fclose ( src_file ) ; fclose ( dst_file ) ; free ( src ) ; free ( dst ) ; return ( 0 ) ; }
source: http://pastie.org/private/s7bpqozymhn5bwxbjjqzq
unsig - SIG File De-/Recrypter
vote + download : http://psx-scene.com/forums/content/unsig-sig-file-decrypter-re-crypter-1771/
Files leaked by an0n
Objective suites creates files in the temp folder inside the Objective Suites folder where the EXE is ran whenever it processes teh commands in a sig file. This section attempts to unravel what these files are.
auth_0.txt
auth_0.txt is the MAC of a NIC, the JIG PC's used at the repair centers may very well be dual homed. One NIC for PS3 Communication and one for external communication.
auth_1_.txt
auth_1.txt is the MAC of another NIC, the JIG PC's used at the repair centers may very well be dual homed. One NIC for PS3 Communication and one for external communication.
auth_01.txt
This file is simply:
auth_0.txt+auth_1.txt.
auth_10.txt
This file is simply:
auth_1.txt+auth_0.txt