Просмотров: 94232-01-2012, 22:07 Сегодня разработчик Naehrwert, обновил свое приложение SCETool до версии 0.1.1. Информация о SCETool 0.0.1 (данная версия приложения читает SPU файлы в .SELF файлах прошивки): scetool 0.0.1 (C) 2011 by naehrwert Name Type SDK-Type Version isoldr 3.50 SELF 0x0000 0x0003005000000000 isoldr 3.41 SELF 0x0000 0x0003004100000000 isoldr 1.00 SELF 0x0000 0x0001000000000000 metldr SELF 0x0000 0x0000000000000000 spp 0x00 SPP 0x0000 0x0000000000000000 pkg 0x00 PKG 0x0000 0x0000000000000000 Magic 0x53434500 [OK] Version 0x00000002 SDK Type [Type 0] Header Type [SELF] Metadata Offset 0x000001B0 Header Length 0x0000000000000480 Data Length 0x0000000000012BF4 Key 00000000: AC 0E 35 E4 A9 22 07 C7 09 2C 38 66 69 45 34 31 IV 00000000: 1C 7D C8 A3 EB B9 C8 9C BB E4 B6 A6 A6 49 61 C2 Signature Input Length 0x0000000000000450 unknown_0 0x00000001 Section Count 0x00000003 Key Count 0x00000016 Signature Info Size 0x00000030 unknown_1 0x00000000 unknown_2 0x00000000 Idx Offset Size Type Index unk_1 SHA1 Encrypted Key IV Compressed 000 00000500 00011C20 02 00 02 00 [YES] 06 07 [NO ] 001 00012120 000000A0 02 01 02 08 [YES] 0E 0F [NO ] 002 00012EE4 00000190 01 03 02 10 [NO ] [NO ] 00000000: F9 A1 54 8A A2 E3 12 FE 3B 67 CB 5E 02 03 66 82 00000001: EF E2 22 82 00 00 00 00 00 00 00 00 00 00 00 00 00000002: F4 06 C9 67 46 0F 09 C3 54 E5 0F DB BD 63 74 A6 00000003: A9 00 9B 0D 53 B4 4E 3E F2 EB 3D 7A C3 0A 79 C3 00000004: 6A 55 C9 6F 72 DE 4E 7E 7A 0D C2 CB 27 F8 C9 9A 00000005: C3 08 9E 65 A9 DF 80 B1 7E 66 DF 6B 9D 10 33 99 00000006: 2A 3C 73 80 C6 1B 85 24 9F 95 3D BE A9 A5 63 38 00000007: CB 41 E6 46 F8 B2 6E 06 D4 1A 5B F5 08 48 28 D3 00000008: 13 07 A2 4F 1C 32 3F D7 15 47 D9 50 BF E4 11 04 00000009: 18 7F EC 72 00 00 00 00 00 00 00 00 00 00 00 00 0000000a: F4 06 C9 67 46 0F 09 C3 54 E5 0F DB BD 63 74 A6 0000000b: A9 00 9B 0D 53 B4 4E 3E F2 EB 3D 7A C3 0A 79 C3 0000000c: 6A 55 C9 6F 72 DE 4E 7E 7A 0D C2 CB 27 F8 C9 9A 0000000d: C3 08 9E 65 A9 DF 80 B1 7E 66 DF 6B 9D 10 33 99 0000000e: 2A 3C 73 80 C6 1B 85 24 9F 95 3D BE A9 A5 63 38 0000000f: CB 41 E6 46 F8 B2 6E 06 D4 1A 5B F5 08 48 28 D3 00000010: 2A AE E7 5C 8C EB 44 4A 62 F4 DF EF 77 5B 02 42 00000011: C7 5C 2D 5C 00 00 00 00 00 00 00 00 00 00 00 00 00000012: F4 06 C9 67 46 0F 09 C3 54 E5 0F DB BD 63 74 A6 00000013: A9 00 9B 0D 53 B4 4E 3E F2 EB 3D 7A C3 0A 79 C3 00000014: 6A 55 C9 6F 72 DE 4E 7E 7A 0D C2 CB 27 F8 C9 9A 00000015: C3 08 9E 65 A9 DF 80 B1 7E 66 DF 6B 9D 10 33 99 unknown_0 0x0000000000000003 App Info Offset 0x0000000000000070 ELF Offset 0x0000000000000090 PH Offset 0x00000000000000D0 SH Offset 0x0000000000012EE4 Section Info Offset 0x0000000000000110 SCE Version Offset 0x0000000000000150 Control Info Offset 0x0000000000000160 Control Info Size 0x0000000000000070 Auth ID [isoldr] Vendor ID 0xFF000000 SELF Type [Secure loader] Version 0x0003004100000000 Type [EXEC] Machine [SPU] Version 0x00000001 Entry 0x000259E0 PH Offset 0x00000034 SH Offset 0x00012A64 Flags 0x00000000 PH Count 0x0002 SH Count 0x000A SHStr Idx 0x0009 Idx Name Type Flags Address Offset Size ES Align LK 000 00000000 NULL ... 00000 00000 00000 00 00000 00 001 0000000B PROGBITS .AE 25800 00080 001DC 00 00001 00 002 00000022 PROGBITS .AE 259E0 00260 0F1D0 00 00008 00 003 00000028 PROGBITS .A. 34BB0 0F430 02870 00 00010 00 004 00000030 PROGBITS WA. 374A0 11CA0 00070 00 00010 00 005 00000036 PROGBITS WA. 37510 11D10 0001C 00 00004 00 006 0000003D PROGBITS WA. 3752C 11D2C 00014 00 00004 00 007 00000044 NOBITS WA. 37540 11D40 039B0 00 00010 00 008 00000049 PROGBITS ... 00000 11D40 00CD2 00 00001 00 009 00000001 STRTAB ... 00000 12A12 00052 00 00001 00 Idx Type Offset VAddr PAddr FileSize MemSize Flags Align 000 LOAD 00080 25800 25800 11C20 11C20 W.E 00080 001 LOAD 11CA0 374A0 374A0 000A0 03A50 .AE 00080 Информация о Friday (данное приложение не было протестировано, но должно работать): friday (C) 2011 by naehrwert This is a POC for a isolated spu binary. Generate a self encrypted+signed with the metldr keys out of friday.elf. Then use friday.h to write a PPU application that loads the self by utilizing metldr and DMAs your console’s EID2 to the shared SPU LS. It will generate the P and S block from it, that is used to pair the BD drive to the specific console. You can then DMA the blocks out from the LS and send them to the drive to remarry it to the console. Communication with the SPU is done over in_mbox and out_mbox. MSG_OUT_* is send from the SPU code to out_mbox. MSG_IN_* should be written from the PPU to in_mbox. When MSG_OUT_READY arrives the PPU should DMA the EID2 to EID2_START and send MSG_IN_READY. When MSG_OUT_GEN_DONE arrives the PPU should DMA the blocks out from BLOCKS_START and send MSG_IN_DIE Разработчик Naehrwert обновил свое приложение SCETool до версии 0.0.3, в котором добавил поддержку ELF64. Информация из файла vsh.self полученная с помощью приложения SCETool 0.0.3: scetool 0.0.3 (C) 2011 by naehrwert Name Type SDK-Type Version SELF-Type pkg PKG 0x0000 0x0000000000000000 spp SPP 0x0000 0x0000000000000000 metldr SELF 0x0000 0x0000000000000000 [Secure Loader] isoldr SELF 0x0000 0x0001000000000000 [Isolated SPU Module] appldr SELF 0x0000 0x0003001500000000 [Application] isoldr SELF 0x0000 0x0003004100000000 [Isolated SPU Module] appldr SELF 0x0004 0x0003004100000000 [Application] isoldr SELF 0x0000 0x0003005000000000 [Isolated SPU Module] rvk RVK 0x0000 0x0003005500000000 Magic 0x53434500 [OK] Version 0x00000002 SDK Type [3.40 - 3.42] Header Type [SELF] Metadata Offset 0x000003F0 Header Length 0x0000000000000900 Data Length 0x00000000007033E0 Key F9 F8 37 BB D6 B4 90 75 AF 8F D5 8C 36 8A 0C CE IV 18 27 0D 71 1E 37 1D 0A 95 D3 28 BB CB 95 04 B8 Signature Input Length 0x00000000000008A0 unknown_0 0x00000001 Section Count 0x00000006 Key Count 0x0000002E Signature Info Size 0x00000030 unknown_1 0x00000000 unknown_2 0x00000000 Idx Offset Size Type Index Hashed SHA1 Encrypted Key IV Compressed 000 00000900 002CB8FD 02 00 [YES] 00 [YES] 06 07 [YES] 001 002DAFE0 000208EC 02 01 [YES] 08 [YES] 0E 0F [YES] 002 002FB8D0 00000000 02 02 [YES] 10 [YES] 16 17 [NO ] 003 002FB8D0 00000000 02 03 [YES] 18 [YES] 1E 1F [NO ] 004 002FB8D0 00000000 02 04 [YES] 20 [YES] 26 27 [NO ] 005 002FB9E0 00000740 01 03 [YES] 28 [NO ] -- -- [NO ] 00: F1 E9 B8 35 F0 7E 78 FF 54 70 D9 64 CA 1A 5D AB 01: 22 03 D7 61 00 00 00 00 00 00 00 00 00 00 00 00 02: C4 7C 03 A7 8C F6 FA B6 E9 09 DA C8 D1 B9 C2 95 03: A3 DA 6A 34 D2 3F 01 56 23 CC DD FB A4 EB A3 17 04: C3 83 AF F5 66 A8 A4 0F 07 ED 77 CD 74 FC 0A 75 05: E9 8E B9 36 38 26 87 97 45 C1 B4 9E B1 11 42 B9 06: 83 01 1F 35 4C 13 15 BC 38 2C AD E8 1A AD 16 84 07: FA E8 56 C6 07 15 C3 3C C5 0E 2B 9C 17 AD 72 88 08: DD 0D 18 5F 5A 1E 21 E9 08 2C 0F A8 25 FB D0 B0 09: 47 5E 2F 88 00 00 00 00 00 00 00 00 00 00 00 00 0A: C4 7C 03 A7 8C F6 FA B6 E9 09 DA C8 D1 B9 C2 95 0B: A3 DA 6A 34 D2 3F 01 56 23 CC DD FB A4 EB A3 17 0C: C3 83 AF F5 66 A8 A4 0F 07 ED 77 CD 74 FC 0A 75 0D: E9 8E B9 36 38 26 87 97 45 C1 B4 9E B1 11 42 B9 0E: 83 01 1F 35 4C 13 15 BC 38 2C AD E8 1A AD 16 84 0F: FA E8 56 C6 07 15 C3 3C C5 0E 2B 9C 17 AD 72 88 10: 25 48 16 0F 7B C8 98 8B D2 7E DF 38 B4 42 0B 7C 11: 17 70 C7 32 00 00 00 00 00 00 00 00 00 00 00 00 12: C4 7C 03 A7 8C F6 FA B6 E9 09 DA C8 D1 B9 C2 95 13: A3 DA 6A 34 D2 3F 01 56 23 CC DD FB A4 EB A3 17 14: C3 83 AF F5 66 A8 A4 0F 07 ED 77 CD 74 FC 0A 75 15: E9 8E B9 36 38 26 87 97 45 C1 B4 9E B1 11 42 B9 16: 83 01 1F 35 4C 13 15 BC 38 2C AD E8 1A AD 16 84 17: FA E8 56 C6 07 15 C3 3C C5 0E 2B 9C 17 AD 72 88 18: 25 48 16 0F 7B C8 98 8B D2 7E DF 38 B4 42 0B 7C 19: 17 70 C7 32 00 00 00 00 00 00 00 00 00 00 00 00 1A: C4 7C 03 A7 8C F6 FA B6 E9 09 DA C8 D1 B9 C2 95 1B: A3 DA 6A 34 D2 3F 01 56 23 CC DD FB A4 EB A3 17 1C: C3 83 AF F5 66 A8 A4 0F 07 ED 77 CD 74 FC 0A 75 1D: E9 8E B9 36 38 26 87 97 45 C1 B4 9E B1 11 42 B9 1E: 83 01 1F 35 4C 13 15 BC 38 2C AD E8 1A AD 16 84 1F: FA E8 56 C6 07 15 C3 3C C5 0E 2B 9C 17 AD 72 88 20: 25 48 16 0F 7B C8 98 8B D2 7E DF 38 B4 42 0B 7C 21: 17 70 C7 32 00 00 00 00 00 00 00 00 00 00 00 00 22: C4 7C 03 A7 8C F6 FA B6 E9 09 DA C8 D1 B9 C2 95 23: A3 DA 6A 34 D2 3F 01 56 23 CC DD FB A4 EB A3 17 24: C3 83 AF F5 66 A8 A4 0F 07 ED 77 CD 74 FC 0A 75 25: E9 8E B9 36 38 26 87 97 45 C1 B4 9E B1 11 42 B9 26: 83 01 1F 35 4C 13 15 BC 38 2C AD E8 1A AD 16 84 27: FA E8 56 C6 07 15 C3 3C C5 0E 2B 9C 17 AD 72 88 28: FE 14 10 F8 87 F2 19 67 FF DA D2 A7 8D 67 7C 35 29: 6E DC 94 28 00 00 00 00 00 00 00 00 00 00 00 00 2A: C4 7C 03 A7 8C F6 FA B6 E9 09 DA C8 D1 B9 C2 95 2B: A3 DA 6A 34 D2 3F 01 56 23 CC DD FB A4 EB A3 17 2C: C3 83 AF F5 66 A8 A4 0F 07 ED 77 CD 74 FC 0A 75 2D: E9 8E B9 36 38 26 87 97 45 C1 B4 9E B1 11 42 B9 unknown_0 0x0000000000000003 App Info Offset 0x0000000000000070 ELF Offset 0x0000000000000090 PH Offset 0x00000000000000D0 SH Offset 0x00000000002FB9E0 Section Info Offset 0x0000000000000290 SCE Version Offset 0x0000000000000390 Control Info Offset 0x00000000000003A0 Control Info Size 0x0000000000000070 Authentication ID [vsh] Vendor ID [SCEx] SELF Type [Application] Version 0x0003004100000000 Type [EXEC] Machine [PPC64] Version 0x00000001 Entry 0x00000000006D7918 Program Headers Offset 0x0000000000000040 Section Headers Offset 0x0000000000702CA0 Flags 0x00000000 Program Headers Count 0x0008 Section Headers Count 0x001D SH String Index 0x001C Idx Type Offset VAddr PAddr FileSize MemSize PPU SPU RSX Align 000 LOAD 00000000 00010000 00010000 006A1228 006A1228 X-R --R --- 00010000 001 LOAD 006B0000 006C0000 006C0000 00052B90 000A8DE8 -WR -WR --- 00010000 002 LOAD 00702B90 00000000 00000000 00000000 00000000 --R --- --- 00010000 003 LOAD 00702B90 00000000 00000000 00000000 00000000 -WR --- --- 00010000 004 LOAD 00702B90 00000000 00000000 00000000 00000000 -WR -WR -WR 00010000 005 TLS 006EC37C 006FC37C 006FC37C 00000008 0000018C --R --- --- 00000008 006 60000001 006A1200 006B1200 006B1200 00000028 00000028 --- --- --- 00000008 007 60000002 00000000 00000000 006B1228 00000000 00000000 --- --- --- 00000008 Idx Name Type Flags Address Offset Size ES Align LK 000 0000 NULL --- 00000000 00000000 00000000 0000 00000000 00 001 000B PROGBITS -AE 00010200 00000200 0000002C 0000 00000004 00 002 001F PROGBITS -AE 00010230 00000230 00623054 0000 00000008 00 003 0011 PROGBITS -AE 00633284 00623284 00000024 0000 00000004 00 004 0017 PROGBITS -AE 006332A8 006232A8 00001440 0000 00000004 00 005 0025 PROGBITS -A- 006346E8 006246E8 00009960 0000 00000004 00 006 0039 PROGBITS -A- 0063E048 0062E048 00000288 0000 00000004 00 007 0049 PROGBITS -A- 0063E2D0 0062E2D0 00000004 0000 00000004 00 008 0056 PROGBITS -A- 0063E2D4 0062E2D4 000002D8 0000 00000004 00 009 005F PROGBITS -A- 0063E5AC 0062E5AC 00000004 0000 00000004 00 010 006C PROGBITS -A- 0063E5B0 0062E5B0 00000004 0000 00000004 00 011 007A PROGBITS -A- 0063E5B4 0062E5B4 000003F4 0000 00000004 00 012 0084 PROGBITS -A- 0063E9A8 0062E9A8 00000004 0000 00000004 00 013 0092 PROGBITS -A- 0063E9B0 0062E9B0 00070308 0000 00000010 00 014 009A PROGBITS -A- 006AED00 0069ED00 00002500 0000 00000080 00 015 00A5 PROGBITS WA- 006B1200 006A1200 00000028 0000 00000008 00 016 00B5 PROGBITS WA- 006C0000 006B0000 0000029C 0000 00000004 00 017 00BC PROGBITS WA- 006C029C 006B029C 00000230 0000 00000004 00 018 00C3 PROGBITS WA- 006C04CC 006B04CC 00000004 0000 00000004 00 019 00C8 PROGBITS WA- 006C04D0 006B04D0 00014AF8 0000 00000008 00 020 00D5 PROGBITS WA- 006D4FC8 006C4FC8 00000288 0000 00000004 00 021 00E4 PROGBITS WA- 006D5250 006C5250 000026B8 0000 00000008 00 022 00EA PROGBITS WA- 006D7908 006C7908 000171F8 0000 00000008 00 023 00EF PROGBITS WA- 006EEB00 006DEB00 0000D87C 0000 00000008 00 024 00F4 PROGBITS WA- 006FC37C 006EC37C 00000008 0000 00000004 00 025 00FB NOBITS WA- 006FC388 006EC384 00000180 0000 00000008 00 026 0101 PROGBITS WA- 006FC508 006EC508 00016688 0000 00000008 00 027 0107 NOBITS WA- 00712B90 00702B90 00056258 0000 00000010 00 028 0001 STRTAB --- 00000000 00702B90 0000010C 0000 00000001 00 Изменения в приложении SCETool 0.0.4: - Добавлена возможность расшифровать 32 битные ELF файлы. Изменения в приложении SCETool 0.1.1: - Неизвестно..... NEW: Изменения в приложении SCETool 0.1.2: - Неизвестно..... Ссылка на скачивание: SCETool 0.1.2 friday Возможно вам будет интересно:
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь. Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем. Информация Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации. |