This week only. Pastebin PRO Accounts Christmas Special! Don't miss out!Want more features on Pastebin? Sign Up, it's FREE!
Guest

ps3

By: a guest on Nov 17th, 2011  |  syntax: None  |  size: 3.20 KB  |  views: 1,732  |  expires: Never
download  |  raw  |  embed  |  report abuse  |  print
Text below is selected. Please press Ctrl+C to copy to your clipboard. (⌘+C on Mac)
  1. Hello PS3 Scene, this is another anonymous leak!
  2.  
  3. I would like to be called: anon0 to prevent confusion with all the other ‘anonymous’ members
  4.  
  5. 2 months ago, a CEX-to-DEX came out which needed the request-idps.txt
  6.  
  7. It was all accomplished by .SIG files and ObjectiveSuites, they are encrypted files which carry out specific commands to the PS3
  8.  
  9. We are now bringing THREE new .SIG files which can be used with 3.73 FW to carry out certain ‘tasks’
  10. Figure what it can do by yourself… And samples of many files can be found there which can aid in 3.73 getting hacked…
  11. To use ObjSuites: Put PS3 in service mode, connect PS3 to PC by ethernet cable, IP Address to 192.168.0.100
  12.  
  13. Copy files from objcon to root of your usb drive
  14. Start ObjectiveSuites, then power the PS3
  15. All info necessary will be in the temp folder in objectivesuites…
  16.  
  17. This is a part-of-the-equation of hacking the 3.73
  18.  
  19. Some notes: I can guarantee something: There are many exploits present when ObjSuites connects to PS3, it forms a trusting bond… ObjSuites gets LV0/LV1 access
  20. Use this with care…
  21.  
  22. I also bring more detail from an0n, the leaker himself bringing more information and clarification on this leak:
  23.  
  24. 10:44   anonym0us – Okay
  25. 10:44   anonym0us – let me explain
  26. 10:44   anonym0us – ObjectiveSuites is used in combination with a jig
  27. 10:45   anonym0us – It allows more things to be done while PS3 is in service mode
  28. 10:45   anonym0us – something like 2 months ago
  29. 10:45   anonym0us – There was a leak
  30. 10:45   anonym0us – that allowed Retail->Debug
  31. 10:45   anonym0us – but it required a person getting request_idps.txt
  32. 10:45   anonym0us – from Sony
  33. 10:45   anonym0us – It was accomplished by a .SIG file
  34. 10:46   anonym0us – .SIG files carry out commands to the PS3
  35. 10:46   anonym0us – So
  36. 10:46   anonym0us – I got hands on 3 more .SIG files
  37. 10:46   anonym0us – Which report all kinds of things about the PS3
  38. 10:46   anonym0us – But, there is another thing
  39. 10:46   anonym0us – When ObjSuites is used with the PS3 in service mode
  40. 10:46   anonym0us – We can exploit the PS3
  41. 10:47   anonym0us – Sony never bothered fixing bugs between the ObjSuites-PS3 connection
  42. 10:47   anonym0us – Reason?
  43. 10:47   anonym0us – The original ObjSuites required a membership to SCEDevNet
  44. 10:48   anonym0us – this is cracked
  45. 10:48   anonym0us – So
  46. 10:48   anonym0us – yeha
  47. 10:48   anonym0us – yeah
  48. 10:48   anonym0us – thats pretty much it
  49. 10:48   anonym0us – When PS3 connects to ObjSuites
  50. 10:48   anonym0us – you get LV0/LV1 access
  51. 10:48   anonym0us – you get LV0/LV1 access
  52. 10:48   anonym0us – So with a bit of tinkering
  53. 10:48   anonym0us – You can be sure that you can get the PS3 to do what you want ot
  54. 10:48   anonym0us – to*
  55. 10:48   anonym0us – And thats pretty much it
  56.  
  57. Download Links provided (download n mirror before they are gone!):
  58. o3sig:
  59. http://www.multiupload.com/X9HTP0K7KJ
  60.  
  61. ps3/2_mecha:
  62. http://www.multiupload.com/MRESXYZK1E
  63.  
  64. We got you covered on all the latest scene news, don’t let the other slow places around the scene drag you down! Same tuned for more exclusive news only at PS3Hax
  65.  
  66.  
  67.  
  68. Read more: http://www.ps3hax.net/2011/11/exclusive-lv2diagobjectivesuite-winstructions-leaked-leading-to-3-73-cfw/#ixzz1dzSDolfL
  69.  
clone this paste RAW Paste Data