Dismiss Notice

BEWARE of IMPOSTERS, posing as the PS3Xploit Members/Team:


  -PS3Xploit does NOT have a discord channel, some imposter are using one
 

  -If the info can't be found on ps3xploit.com or psx-place.com its fake
 

  -ZuKuTo / OFWModz is one of the fake names of these imposter's are using to represent the PS3xploit team.

 

 

PS3 CECHC freeze when I run DUMP

Discussion in 'PS3Xploit CFW Installer ( PS3 25XX Models & Lower)' started by matti157, Mar 29, 2020.

  1. 1
    0
    5
    matti157

    matti157 Forum Noob

    Joined:
    Mar 29, 2020
    Messages:
    1
    Likes Received:
    0
    Trophy Points:
    5
    Gender:
    Male
    Hi,
    I have been trying to run DUMP to install a CFW for 6 hours now...

    CECHC - NAND - DUMP 2.0.2 set as the browser home page - USB DUMP on the 4th USB port (near BD) - browser exit confirm disabled

    Steps:
    1) Updated to 4.81 OFW to 4.85 OFW via web
    2) I tried to dump several times, always ended up with a FAILED error after 90%
    3) I discovered that I was following the wrong guide of a forum (Italian) I discovered that I was following the wrong guide of a forum (Italian)
    4) I installed 4.85 HFW, now DUMP freeze entire console when I press initialize exploitation (the animation of the XMB is also free)
    5) I reset my PS3 via recovery menu
    6) DUMP Freeze
    7) I reinstalled 4.85.1 via recovery menu
    8) Freeze, but different from before, now hangs the initialize button and the mouse cursor but not XMB animation.

    Both the USB DUMB (in port 0 and in port 1), and the dump on HDD now always do as in point 8

    TL; DR My console freezes when I initialize the exploit

    I need help :(
    Thanks
     
  2. 1,490
    1,025
    272
    psykosis

    psykosis Developer Developer

    Joined:
    Dec 7, 2014
    Messages:
    1,490
    Likes Received:
    1,025
    Trophy Points:
    272
    The NAND dump can take a period of time to accomplish, considering it is reading 256MB of data.
    It also is reading from two different interleaved chips, rather than a singular non interleaved chip.

    Trusting random websites with your console isn't entirely the smartest btw... here's a guide for HEN....https://www.psx-place.com/threads/tutorial-ps3hen-the-great-ps3-hen-all-in-one-guide.24369/
    Here's more information about actually doing what you're trying to accomplish: https://www.psx-place.com/threads/hacking-the-ps3.10718/
     
    Algol likes this.
  3. 983
    393
    97
    Coro

    Coro Member

    Joined:
    May 2, 2019
    Messages:
    983
    Likes Received:
    393
    Trophy Points:
    97
    psykosis links to a ps3hen guide but im sure he didnt see that your model is checc. you dont need hen...just cfw.

    for the dumper (and flasher when ready) i recommend to run locally. you can use a webserver on your pc or even android (kws app). serve the files in the zip to ps3.

    dumper
    http://ps3xploit.com/hfw/release/NOR_NAND_IDPS_dumper_release_2.0.2_PS3Xploit.zip

    writer
    http://ps3xploit.com/hfw/release/NOR_NAND_writer_release_2.0.2_PS3Xploit.zip
    put flash_485.hex from zip on usb

    CHECK YOUR DUMP BEFORE FLASHING!!!
     
    Algol likes this.
  4. 1
    0
    5
    Dynarec

    Dynarec Forum Noob

    Joined:
    Mar 29, 2020
    Messages:
    1
    Likes Received:
    0
    Trophy Points:
    5
    Gender:
    Male
    Sorry if I am rude, I may not have privileges to start a new post. I can't seem to figure out how to start a new one, but when I run my dump in PyPS3Checker I get 3 warnings.

    Version Used: PyPS3checker-standalone-package_2020-02-01_131319


    ******* Getting flash type *******
    Flash type : NAND (partial dump, 239MB)
    ******* Getting SKU identification datas *******
    idps = 0x03
    metldr0 = 0xEDE0
    metldr1 = 0x0EDA
    Matching SKU : OK
    CECHCxx (COK-002)
    Minimum version 1.00
    ******* Getting SDK versions *******
    ROS0 : 485.000
    ROS1 : 485.000
    ******* Checking Header_Magic *******
    002.01 Header Magic 0x00 Filled Area 0 : OK
    002.02 Header Magic : OK
    002.03 Header Magic 0x00 Filled Area 1 : OK
    ******* Checking flash_region_table *******
    003.01 Flash Region Table Header : OK
    003.02 asecure_loader Offset - Length : OK
    003.03 asecure_loader Name : OK
    003.04 eEID Offset - Length : OK
    003.05 eEID Name : OK
    003.06 cISD Offset - Length : OK
    003.07 cISD Name : OK
    003.08 cCSD Offset - Length : OK
    003.09 cCSD Name : OK
    003.10 trvk_prg Offset - Length : OK
    003.11 trvk_prg Name : OK
    003.12 trvk_pkg Offset - Length : OK
    003.13 trvk_pkg Name : OK
    003.14 creserved_0 Offset - Length : OK
    003.15 creserved_0 Name : OK
    003.16 ros Offset - Length : OK
    003.17 ros Name : OK
    003.18 cvtrm Offset - Length : OK
    003.19 cvtrm Name : OK
    003.20 Flash Region Table 0x00 Filled Area : OK
    ******* Checking asure_loader_region *******
    004.01 asecure_loader Header : OK
    004.02 metldr Offset : OK
    004.03 metldr Length : OK
    004.04 metldr Name : OK
    004.05 metldr RevKey : OK
    004.06 metldr Binary Size : OK
    004.07 metldr Statistics : OK
    004.08 asecure_loader 0x00 Filled Area : OK
    ******* Checking eEID_region *******
    005.01 eEID Header : OK
    005.02 EID0 Offset - Length : OK
    005.03 EID1 Offset - Length : OK
    005.04 EID2 Offset - Length : OK
    005.05 EID3 Offset - Length : OK
    005.06 EID4 Offset - Length : OK
    005.07 EID5 Offset - Length : OK
    005.08 EID0 IDPS0 : OK
    005.09 EID0 IDPS1 : OK
    005.10 EID0 Static : OK
    005.11 EID2 BlockSize/Padding : OK
    005.12 EID3 Static0 : OK
    005.13 EID3 Static1 : OK
    005.14 EID3 Static2 : OK
    005.15 EID5 IDPS0 : OK
    005.16 EID5 IDPS1 : OK
    005.17 EID5 Static : OK
    005.18 eEID Region 0xFF Filled Area : OK
    005.19 eEID Statistics0 : OK
    005.20 eEID Statistics1 : OK
    ******* Checking cISD_region *******
    006.01 cISD Header : OK
    006.02 cISD0 Offset - Length : OK
    006.03 cISD1 Offset - Length : OK
    006.04 cISD2 Offset - Length : OK
    006.05 cISD0 0xFF Filled Area : OK
    006.06 cISD1 IDLog Header : OK
    006.07 cISD1 Semistatic 1 : OK
    006.08 cISD1 Semistatic 2 : OK
    006.09 cISD1 0xFF Filled Area 0 : OK
    006.10 cISD1 Static : OK
    006.11 cISD1 Semistatic 3 : OK
    006.12 cISD1 0xFF Filled Area 1 : OK
    006.13 cISD1 Statistics : OK
    006.14 cISD2 : OK
    006.15 cISD 0xFF Filled Area : OK
    ******* Checking cCSD_region *******
    007.01 cCSD Header : OK
    007.02 cCSD Entry Table : OK
    007.03 cCSD 0xFF Filled Area : OK
    ******* Checking Revokation_region *******
    008.00 trvk_prg Region Header : OK
    008.01 trvk_prg0 SCE : OK
    008.02 trvk_prg0 Hash : OK
    Size = 0x2E0
    MD5 = E537DE954DCF25D4DE961DF44549BAF7
    Version = 3.50 (from PUP)
    008.03 trvk_prg1 SCE : OK
    008.04 trvk_prg1 Hash : OK
    Size = 0x2E0
    MD5 = 78629D24BD721488F3A1E846938F87DF
    Version = 3.55 (from PUP)
    008.00 trvk_pkg Region Header : OK
    008.05 trvk_pkg0 SCE : OK
    008.07 trvk_pkg1 SCE : OK
    ******* Checking Unreferenced_Area *******
    008.08 unreferenced area 0xFF filled : OK
    ******* Checking CoreOS_region *******
    009.00 ROS Header : OK
    009.01 ROS0 Header : OK
    009.02 ROS0 Hash : OK
    Size = 0x6FFFE0
    MD5 = B833A708108360FC7913986E29C29B3E
    Version = 4.85 CEX/SEX OFW
    009.03 ROS1 Header : OK
    009.04 ROS1 Hash : OK
    Size = 0x6FFFE0
    MD5 = B833A708108360FC7913986E29C29B3E
    Version = 4.85 CEX/SEX OFW
    ******* Checking cvtrm_region *******
    010.01 cvtrm Header : OK
    010.02 cvtrm Header Static 1 : OK
    010.03 vtrm Magic 1 : OK
    010.05 vtrm Magic 2 : OK
    010.07 cvtrm 0x00 Filled Area : OK
    ******* Checking cell_ext_os_area *******
    011.01 cell_ext_os_area Header : OK
    011.02 cell_ext_os_area 0xFF Filled Area 0 : WARNING!
    All bytes from offset 0xE740028 to offset 0xE740200 should be 0xFF.
    Byte at offset 0xE740028 has value : 0x00
    Subsequent bytes in the range may be wrong as well.
    011.03 cell_ext_os_area Break Section : WARNING!
    At offset : 0xE740200
    Actual data :
    > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    00 00 00 03 00 00 00 00 00 00 00 00 00 00 00 00
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    Expected data :
    > 00 00 00 00 FF FF FF FF FF FF FF FF FF FF FF FF
    00 00 00 03 FF FF FF FF FF FF FF FF FF FF FF FF
    00 00 00 00 00 00 00 00 00 00 FF FF FF FF FF FF
    00 00 00 00 00 00 00 00 00 00 00 00 FF FF FF FF
    00 00 00 00 00 00 00 00 FF FF FF FF FF FF FF FF
    011.04 cell_ext_os_area 0xFF Filled Area 1 : WARNING!
    All bytes from offset 0xE740250 to offset 0xE740400 should be 0xFF.
    Byte at offset 0xE740250 has value : 0x00
    Subsequent bytes in the range may be wrong as well.
    ******* Checking datamatches *******
    per console nonce : OK
    metldr size : OK
    vtrm header datas : OK
    vtrm : OK
    ******* Checking repetitions *******
    Header Magic Repetition : OK
    asecure_loader Repetition : OK
    eEID Repetition : OK
    cISD Repetition : OK
    cCSD Repetition : OK
    trvk_prg Repetition : OK
    trvk_pkg Repetition : OK
    ros Repetition : OK
    cvtrm Repetition : OK
    ******* Checks completed *******
    Total number of checks = 113
    Number of dangers = 0
    Number of warnings = 3
    Following check(s) returned a WARNING!
    011.02 cell_ext_os_area 0xFF Filled Area 0
    011.03 cell_ext_os_area Break Section
    011.04 cell_ext_os_area 0xFF Filled Area 1
    All checks done in 1.64 seconds.
     

Share This Page