Guest User

Untitled

a guest
Oct 21st, 2017
498
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.84 KB | None | 0 0
  1. [00:16] <@Draan> Mathieulh: haha, nice then. IIRC we need kirk 7 key to sign kernel modules
  2. [00:17] <Zecoxao> what about that guy, Proxima?
  3. [00:17] <Zecoxao> seems like he's finding interesting stuff
  4. [00:18] <@Draan> kirk 7 key is used to encrypt kernel header iirc
  5. [00:18] <@Draan> ECDSA encrytion is used to encrypt the file itself
  6. [00:18] == RoxFox64 [~RoxFox64@66-190-90-133.dhcp.athn.ga.charter.com] has quit [Ping timeout: 258 seconds]
  7. [00:18] <@Draan> looks like Proxima figured out that stuff
  8. [00:22] <+Mathieulh> you can calculate the priv
  9. [00:22] <+Mathieulh> for kirk 0x01
  10. [00:22] <+Mathieulh> that's enough to fake sign any kernel module
  11. [00:22] <+Mathieulh> with what you already have
  12. [00:23] <some1_> you need to forge ~PSP header as well
  13. [00:24] <Zecoxao> so all you need is kirk 7?
  14. [00:25] <+Mathieulh> you don't need kirk 7 cause you can reuse sony's own stuff
  15. [00:25] <some1_> lol, so back to fake signing?
  16. [00:25] <@Draan> kernel modules? xD
  17. [00:25] <+Mathieulh> the same reason you don't need the curves for ecdsa
  18. [00:25] <+Mathieulh> because you can reuse their R value
  19. [00:27] <@Draan> Mathieulh: well...so it's possibile to sign an updater?
  20. [00:28] <some1_> I'm sure perm cfw will be out by the end of the year
  21. [00:28] <some1_> actually, I'm surprised its not further along already
  22. [00:29] <@PspHellcat> o_O
  23. [00:29] <@PspHellcat> nold?
  24. [00:29] <some1_> lolno
  25. [00:29] <@Draan> artart? o_O
  26. [00:29] <+Mathieulh> Draan yes it is
  27. [00:29] <+Mathieulh> but there is no point
  28. [00:30] <+Mathieulh> because we already have a kernel exploit
  29. [00:30] <+Mathieulh> also sony can fix this in their next firmware
  30. [00:30] <some1_> mhmm
  31. [00:30] <@PspHellcat> sploits can be fixed
  32. [00:30] <+Mathieulh> by using cmd 0x10
  33. [00:31] <+Mathieulh> there is another neat exploit out there anyway
  34. [00:31] <+Mathieulh> it's just not public
  35. [00:32] <+Mathieulh> and I am not the one who found it so meh....
  36. [00:34] <Zecoxao> so, it's possible to fake sign kernel applications without the fear for a system update or not?
  37. [00:34] <@Draan> no, they can fix it
  38. [00:34] <+Mathieulh> yah
  39. [00:34] <@JEEB> unless something is done in hardware I'd say system updates can fix everything
  40. [00:34] <+Mathieulh> they can just stop using cmd 0x01
  41. [00:34] <some1_> yup
  42. [00:34] <@JEEB> yeh
  43. [00:34] <@Draan> because they can change kernel encryption as they wish
  44. [00:34] <+Mathieulh> and provide their own pub + priv
  45. [00:34] <some1_> find an exploit in pre-ipl tho, screwed for life :D
  46. [00:35] <+Mathieulh> not really
  47. [00:35] <+Mathieulh> you'd still need a way to write your ipl
  48. [00:35] <+Mathieulh> basically you'd need service mode + your own IPL
  49. [00:35] <+Mathieulh> then you are settled
  50. [00:35] <some1_> well, if you can obtain pre-ipl somehow, I'm sure you can forge the 0x20 hash
  51. [00:36] <@Draan> btw, i think we can truesign IPLs for old devices ;)
  52. [00:36] <@Draan> as it uses only 0x1
  53. [00:36] <some1_> or I should say, most likely 0x14 hash + salt
  54. [00:36] <+Mathieulh> well, we can sign the ecdsa
  55. [00:36] <+Mathieulh> for a pspgo or 3k ip
  56. [00:36] <+Mathieulh> ipl*
  57. [00:37] <+Mathieulh> cause we have the priv
  58. [00:37] <+Mathieulh> but we don't know how they generate the 0x20 hash
  59. [00:37] <+Mathieulh> that's what's stopping us
  60. [00:37] <some1_> mhmm
  61. [00:37] <@Draan> bruteforce anyone? xD
  62. [00:37] <some1_> lmao
  63. [00:37] <@JEEB> lol
  64. [00:38] <@PspHellcat> knowing sony
  65. [00:38] * JEEB coughs and looks at the access key to a computing cluster
  66. [00:38] <@PspHellcat> its some lazy XOR
  67. [00:38] <some1_> it could be anythign tbh
  68. [00:38] <some1_> sha-1 + xor + possible encryption
  69. [00:38] <some1_> + salt
  70. [00:39] <@JEEB> yah
  71. [00:41] <+Mathieulh> I think we abused the only possible pre-ipl exploits
  72. [00:41] <+Mathieulh> and they closed them
  73. [00:41] <+Mathieulh> the only way now would be to decap
  74. [00:41] <some2_> <Draan> bruteforce anyone? xD <--- grab an 88v3 and go ahead and start xP
Add Comment
Please, Sign In to add comment