PS3 [UPDATE] IDPS Dumper (PS3 NAND / NOR ) - 4.81/4.82 OFW Compatible by Team PS3Xploit

Discussion in 'PS3 News' started by STLcardsWS, Nov 11, 2017.

By STLcardsWS on Nov 11, 2017 at 10:41 AM
  1. 6,404
    4,460
    123
    STLcardsWS

    STLcardsWS Administrator

    Joined:
    Sep 18, 2014
    Messages:
    6,404
    Likes Received:
    4,460
    Trophy Points:
    123
    {UPDATE v0.2.3 Released(See tab)}
    Following the official announcement of the PS3Xploit news (4.81 OFW Exploit), the devs behind the project have fulfilled the promises of releasing the IDPS Dumper for OFW 4.81/4.82 as this release is ready for the public. Now there is many more things being worked surrounding the overall project but this IDPS Dumper works on all models of the PS3 (NOR and NAND, note 12 GB EMMC will be supported soon in an updated release) and no reason not to release this tool. Since PS3 firmware 4.70 Sony had blocked flatz IDPS extracting tool (IDPS Stealer) and there has not been a known way to obtain the IDPS on OFW (4.70 +) consoles , but now this tool can now obtain your PS3's ID, which can have various uses, the tool has been confirmed to work on SuperSlim models by the team. . If you have not read the previous details about the PS3Xploit project, then checkout this official thread to get the firsthand information about this ambitious PS3 project.


    capture_0.2.3.jpg
    (UPDATE v0.2.3)


    • UPDATE v0.2.3- IDPS Dumper for 4.82 OFW
      • Added 4.82 Support
      • Removed all extra requirements like JQuery..
      • Removed the need for string relocations to improve the initial memory search process & overall trigger times.

    • UPDATE v0.2.3- IDPS Dumper for 4.81 OFW

      • Removed all extra requirements like JQuery..
      • Removed the need for string relocations to improve the initial memory search process & overall trigger times.



    • UPDATE v0.2.1a- IDPS Dumper for 4.81 OFW

      we have some more exciting news to bring you!! :cheerful:

      We have been working very hard to bring eMMC support for the newest SuperSlims CECH-40xxA, CECH-42xxA , CECH-43xxA and that has happened. :D

      The team would like to present a nice little update to the 4.81 IDPS Dumper now supporting eMMC hardware revision consoles!!

      Please report any issues you have while using this new version on any of the flash types, NAND, NOR, and eMMC.

      Thank You to all :cool:

      v0.2.1a
      • Added eMMC SuperSlim Support (CECH-40xxA, CECH-42xxA , CECH-43xxA)
      • Misc Tweaks To Exploit
      • Small typo on index.html pointed out by @Turranius - Fixed

      How to use this:
      *** MAKE SURE TO RUN AS ADMINISTRATOR ***
      install python to use server.py or another HTTP server of your choosing on both Windows and Linux!​

      On windows - Install any of these optional HTTP servers:

      On linux:
      • install python for your distribution using apt-get, yum, and similar commands.
      • make script executable using "chmod a+x server.py" or "chmod 775 server.py" or "chmod 777 server.py"
      • execute python script using "/usr/bin/python $exploitFolder/server.py" or "./server.py"

      Update
      on Android: (
      instructions from @No0bZiLLa)
      • I can confirm this does work if using an http server on Android. what i did was downloaded the zip (on my phone) and extracted it and then download something like Simple HTTP Server and point the server to the folder that contains index.html. once you do that just reload the server and make a note of what the ip:port is. then just go to ps3, type in ip:port (eg 192.168.2.7:12345) as specified in simple http server and then select the appropriate button for your system.


      Then run (for python):

      • On windows - windows.bat
      • On linux - linux.sh


      Usage Tips:

      1) Try using a LAN connection or a solid WiFi connection during exploitation. A weak signal can cause problems.
      2) If the exploit takes more than 5 minutes to work, reload page, browser, or restart console and try again.
      3) If you are using a LAN connection and experience network issues, make sure all cables to router are in working order.​



    • IDPS Dumper Release (v0.2 - After Leak Release)
      ok....the moment all of you have been waiting for......i assume :cheerful:
      • File: ps3_481_idps_dumper-PS3XPloit.zip
      • MD5 Hash: FFDA70AB2D1677886083F99185C54FE3
      • SHA-256 Hash: 852BDB301753C4F4A7E946188E850D3D325EEAA259B61AE2B5AE31320B2F292B

      enjoy this release from our team :victorious: we will be working hard to add eMMC support as soon as possible!!


      The documentation will be updated as time goes on. There is a readme.txt file included with basic setup and usage instructions.

      Please stay tuned for future tools and releases :D

      and once again, THANK YOU to everyone involved bringing this all together, without all of you, none of this would have happened!!!

      Additional details from @bguerville
      "The idps dumper will create a file on usb000 then beep 3 times & shutdown in all cases, even if flash memory read fails. emmc should not make a difference to this. You will get garbage in idps.bin in that case.

      Js errors with a black page message on ps3 should not happen. If ever it did, just report & in the meantime keep relaunching the exploit. Nobody has had this issue in dozens of tests though.

      And clearing cache or cookies is totally unnecessary with the exploit & the wk js interpreter. Between runs garbage collection will take care of cleaning up what is needed, the job it does is always sufficient".


    It's essential not to flood the browser memory with junk before running the exploit. The reason for this is that due to javascript core memory usage limitations we are scanning several times a small range of browser memory (a few Mb) to find some essential data in RAM, if the memory is flooded then the range to scan becomes much larger & the probabilities that our data is found in the smaller range decrease dramatically....

    So in short, never use the browser or set a homepage you cancel before running the exploit!
    If you need to, set the homepage to 'blank', close the browser then reopen it to start the idps dumper.

    Set-up Steps:
    1. Setup a small Web server on pc or smartphone. The Python http server is not required for most users, it was provided for developers. Since v0.2.3, all other extra requirements have been removed. Don't come to us for explanations about how to run a http server though. Google it.
    2. Extract the files in your http server root folder.
    3. Put a fat32 USB key in port closest to BD Drive (/dev_usb000).
    4. Open the ps3 browser & write the ip address of your server (and the port if not 80).
    5. Run until ps3 beeps & shutdown. The idps should be on your USB drive as idps.bin.
    - Downloads -
    • MD5 Hash: 3c2e1582f52e1002a12ad280f426d0c6
    • SHA-256 Hash: 1c49eabd64275171a60c90f0f06f503b7055f4ff863f87e7960d41464d127443
    • MD5 Hash: 71dd906e585bf470f84f9d4fb10c1f37
    • SHA-256 Hash: d4bffe2b7d08c1dda275590229f86903f1db487e9a78364d6a025c3734cd8f68
     

    Attached Files:

    Last edited: Nov 19, 2017

Comments

Discussion in 'PS3 News' started by STLcardsWS, Nov 11, 2017.

    1. MiZAX
      MiZAX
      Hi pink1, so I checked everything, and made a list of the comparison:
      Code:
      idps_emmc_4.81 changes:
      addr   4.81->4.80 (gadget)
      --------------------------
      0x2267 E59C->E588 (3)
      0x3348 E59C->E588 (3)
      0x3999 C774->C780 (5)
      0x4433 7BF8->7BE4 (7)
      0x5036 C774->C780 (5)
      0x6555 3B14->3B20 (6)
      0x6989 3B14->3B20 (6)
      0x11483   1->0
      --------------------------
      toc and gadget1,2,4,8 are the same from 4.81 to 4.80
      Ran it with the miniwebserver, placed the usb thumb drive (16gb fat32) on the right most port, boot up my ps3, selected my user profile>browser>blank page appears>bookmarks>select the direct link to the html file>run for 3-4seconds and crashes. I check the drive and has nothing in it (just a mkv file I already had there). Placed the drive back on right port, boot up>system restore>....>same happens again, changed to the python server:
      Code:
      Starting server on 169.254.105.54:8080
      169.254.25.67 - - [24/Dec/2017 14:52:52] "GET /htdocs/html/idps_emmc.html HTTP/1.1" 200 -
      169.254.25.67 - - [24/Dec/2017 14:52:52] "GET /htdocs/html/include/utils.js HTTP/1.1" 200 -
      169.254.25.67 - - [24/Dec/2017 14:52:52] "GET /htdocs/html/include/exp_rel.js HTTP/1.1" 200 -
      169.254.25.67 - - [24/Dec/2017 14:52:58] "GET /htdocs/html/idps_emmc.html HTTP/1.1" 200 -
      169.254.25.67 - - [24/Dec/2017 14:52:58] "GET /htdocs/html/include/utils.js HTTP/1.1" 200 -
      169.254.25.67 - - [24/Dec/2017 14:52:58] "GET /htdocs/html/include/exp_rel.js HTTP/1.1" 200 -
      169.254.25.67 - - [24/Dec/2017 14:53:05] "GET /htdocs/html/idps_emmc.html HTTP/1.1" 200 -
      169.254.25.67 - - [24/Dec/2017 14:53:05] "GET /htdocs/html/include/utils.js HTTP/1.1" 200 -
      169.254.25.67 - - [24/Dec/2017 14:53:05] "GET /htdocs/html/include/exp_rel.js HTTP/1.1" 200 -
      169.254.25.67 - - [24/Dec/2017 14:53:11] "GET /htdocs/html/idps_emmc.html HTTP/1.1" 200 -
      169.254.25.67 - - [24/Dec/2017 14:53:11] "GET /htdocs/html/include/utils.js HTTP/1.1" 200 -
      169.254.25.67 - - [24/Dec/2017 14:53:11] "GET /htdocs/html/include/exp_rel.js HTTP/1.1" 200 -
      169.254.25.67 - - [24/Dec/2017 14:53:18] "GET /htdocs/html/idps_emmc.html HTTP/1.1" 200 -
      169.254.25.67 - - [24/Dec/2017 14:53:18] "GET /htdocs/html/include/utils.js HTTP/1.1" 200 -
      169.254.25.67 - - [24/Dec/2017 14:53:18] "GET /htdocs/html/include/exp_rel.js HTTP/1.1" 200 -
      169.254.25.67 - - [24/Dec/2017 14:53:25] "GET /htdocs/html/idps_emmc.html HTTP/1.1" 200 -
      169.254.25.67 - - [24/Dec/2017 14:53:25] "GET /htdocs/html/include/utils.js HTTP/1.1" 200 -
      169.254.25.67 - - [24/Dec/2017 14:53:25] "GET /htdocs/html/include/exp_rel.js HTTP/1.1" 200 -
      169.254.25.67 - - [24/Dec/2017 14:53:32] "GET /htdocs/html/idps_emmc.html HTTP/1.1" 200 -
      169.254.25.67 - - [24/Dec/2017 14:53:32] "GET /htdocs/html/include/utils.js HTTP/1.1" 200 -
      169.254.25.67 - - [24/Dec/2017 14:53:32] "GET /htdocs/html/include/exp_rel.js HTTP/1.1" 200 -
      169.254.25.67 - - [24/Dec/2017 14:53:38] "GET /htdocs/html/idps_emmc.html HTTP/1.1" 200 -
      169.254.25.67 - - [24/Dec/2017 14:53:38] "GET /htdocs/html/include/utils.js HTTP/1.1" 200 -
      169.254.25.67 - - [24/Dec/2017 14:53:38] "GET /htdocs/html/include/exp_rel.js HTTP/1.1" 200 -
      169.254.25.67 - - [24/Dec/2017 14:53:45] "GET /htdocs/html/idps_emmc.html HTTP/1.1" 200 -
      169.254.25.67 - - [24/Dec/2017 14:53:45] "GET /htdocs/html/include/utils.js HTTP/1.1" 200 -
      169.254.25.67 - - [24/Dec/2017 14:53:45] "GET /htdocs/html/include/exp_rel.js HTTP/1.1" 200 -
      169.254.25.67 - - [24/Dec/2017 14:53:51] "GET /htdocs/html/idps_emmc.html HTTP/1.1" 200 -
      169.254.25.67 - - [24/Dec/2017 14:53:51] "GET /htdocs/html/include/utils.js HTTP/1.1" 200 -
      169.254.25.67 - - [24/Dec/2017 14:53:51] "GET /htdocs/html/include/exp_rel.js HTTP/1.1" 200 -
      169.254.25.67 - - [24/Dec/2017 14:53:58] "GET /htdocs/html/idps_emmc.html HTTP/1.1" 200 -
      169.254.25.67 - - [24/Dec/2017 14:53:58] "GET /htdocs/html/include/utils.js HTTP/1.1" 200 -
      169.254.25.67 - - [24/Dec/2017 14:53:58] "GET /htdocs/html/include/exp_rel.js HTTP/1.1" 200 -
      169.254.25.67 - - [24/Dec/2017 14:54:04] "GET /htdocs/html/idps_emmc.html HTTP/1.1" 200 -
      169.254.25.67 - - [24/Dec/2017 14:54:04] "GET /htdocs/html/include/utils.js HTTP/1.1" 200 -
      169.254.25.67 - - [24/Dec/2017 14:54:04] "GET /htdocs/html/include/exp_rel.js HTTP/1.1" 200 -
      same steps, empty browser page>bookmark with the address>takes a while but my ps3 beeps out>I check the drive and no sinal of the idps bin :|

      I'm gonna try the new version you posted here, hope it works :D

      EDIT: IT WORKED!!!! Formated my usb stick using diskpart (somehow it had a gpt asterisk on the main partition dunno why)>stick on the right port>boot up>blank browser page>opened up the index page (gave an alert saying that I've the 4.82 but I'm on the 4.80)>selected the emmc option (I've a CECH 4004A)>it made 4 reloads and beeped out. Checked on my pc the idps.bin file and it had my PSID :D Now I'm gonna try to see the encrypted thing of my backup :D

      THANK YOU! pink, bguerville and esc0rtd3w. Merry Christmas! :home::peekaboogift:
      Last edited: Dec 24, 2017
    2. pink1
      pink1
      @MiZAX Awesome!! Merry Christmas, I hope you have fun.
    3. gimmiluigi
      gimmiluigi
      Hi,
      I got the file idps.bin from my playstation (v. 4004c), everything went fine. But I haven't find anywhere what I have to do now?
      Thanks in advance!
    4. bguerville
      bguerville
      That would be because there is nothing else in particular for you to do.
      You extracted your idps & that is it. Whether you have a use for your idps or not is a different story altogether, I can't answer that for you...
      STLcardsWS likes this.
    5. roadieroundup
      roadieroundup
      I cant make this work, always I get 80710092 error on my ps3 browser
      3001B 4.82 OFW
    6. bguerville
      bguerville
      Your problem is network related, not exploit related !
      0x80710092 = CELL_HTTP_ERROR_NET_CONNECT_TIMEOUT
      That means the browser times out while trying to connect to the Web server hosting the exploit.
      Check your network connection setting (use ethernet, not WiFi), make sure there is no router issues, double check the settings of the web server hosting the exploit files including permissions...
      roadieroundup likes this.
    7. roadieroundup
      roadieroundup
      I change the server to an android http server and it works! now I have the idps.bin file, how I can extract the idps?
    8. bguerville
      bguerville
      Open the file with an hex editor.
      On PC, you should probably try HxD.

Share This Page