Jump to content


PS3 4.xx NAND/NOR/EMMC Flash Dumper 2.0


¿Quieres enterarte al momento de las nuevas descargas? Síguenos en Twitter o Mastodon!
Ayúdanos con el mantenimiento de la web con una donación vía Paypal.

Supports Full NOR Flash memory dumping on all models PS3 consoles using NOR.

It's essential not to flood the browser memory with junk before running the exploit. The reason for this is that due to javascript core memory usage limitations we are scanning several times a small range of browser memory (a few Mb) to find some essential data in RAM, if the memory is flooded then the range to scan becomes much larger & the probabilities that our data is found in the smaller range decrease dramatically....

So in short, never use the browser or set a homepage you cancel before running the exploit!
If you need to, set the homepage to 'blank', close the browser then reopen it to start the flash dumper

Usage Tips:

  1. Try using a LAN connection or a solid WiFi connection during exploitation. A weak signal can cause problems.
  2. If the exploit takes more than 5 minutes to work, reload page, browser, or restart console and try again.
  3. If you are using a LAN connection and experience network issues, make sure all cables to router are in working order.

Steps:

  1. Setup a small Web server on pc or smartphone. A custom miniweb application has been created by Aldo, and supplied to host files if you would like to use it. Don't come to us for explanations about how to run a http server though. Google it.
  2. Extract the files from release to your http server root folder.
  3. Put a FAT32 USB key in port closest to BD Drive (/dev_usb000).
  4. DOUBLE-CHECK your flash drive on XMB to make sure it shows up under Music, Photos, Videos, etc.
  5. Open the ps3 browser, press start & write the ip address of your server (and the port if not 80).
  6. Click on the button and wait for PS3 to power down. DO NOT STOP THE PROCESS ONCE STARTED!!
  7. Once PS3 has powered down, the NOR flash memory dump can be found on the USB device in a file named 'dump.hex'.

Courtesy of:

  • W (Javascript, Research & Testing)
  • esc0rtd3w (Debugging, Research & Testing)
  • bguerville (ROP Chaining/Javascript & Debugging)
  • Habib (ROP Chaining & Debugging)

No te pierdas nada, síguenos en Twitter o Mastodon!
Preguntas, aportes y peticiones en el foro.
Si te sirve lo que hacemos, ayúdanos con el mantenimiento de la web con una donación vía Paypal.

×
×
  • Crear nuevo...