User:Whovian9369
From Redump Wiki
Whovian9369 (Talk | contribs) m (→Tools) |
Whovian9369 (Talk | contribs) (Add an extra newline to prevent some stuff from merging into one line) |
||
Line 16: | Line 16: | ||
===Tools=== | ===Tools=== | ||
Whovian Note: FIX THE BULLET POINTS | Whovian Note: FIX THE BULLET POINTS | ||
+ | |||
Requirements: Soft/hardmodded PS3 running a custom firmware to dump the ISO to an external USB drive. | Requirements: Soft/hardmodded PS3 running a custom firmware to dump the ISO to an external USB drive. | ||
* Compatible PS3 Console (As of writing, all consoles can be modded while on latest firmware, which is 4.84) | * Compatible PS3 Console (As of writing, all consoles can be modded while on latest firmware, which is 4.84) | ||
* If you get a Slim made in 2011 or later, you will be able to do less than a console made in 2010 or earlier. | * If you get a Slim made in 2011 or later, you will be able to do less than a console made in 2010 or earlier. | ||
- | + | ||
+ | * "Everything below 2500 Series, like 2000 Series Slim, are all hackable ;)" [https://www.psx-place.com/threads/looking-to-buy-a-ps3-slim-to-install-cfw-need-advice-on-models.18922/#post-129317] | ||
* MultiMAN 04.20.00 or higher - [https://store.brewology.com/ahomebrew.php?brewid=24 Get the "Base" file] | * MultiMAN 04.20.00 or higher - [https://store.brewology.com/ahomebrew.php?brewid=24 Get the "Base" file] | ||
* [https://archive.org/download/GetKeyR2GameOS.7z/GetKey-r2-GameOS.7z GetKey r2] | * [https://archive.org/download/GetKeyR2GameOS.7z/GetKey-r2-GameOS.7z GetKey r2] |
Revision as of 04:10, 2 June 2019
This is my User Page. I'm mainly using it as a scratch pad for any "big" wiki edits. :)
Placeholder.
Contents |
Dumping with a PS3 Console with CFW 3.56 or Newer
Assuming you have Rebug CFW installed, it's really easy and you can do it mainly in Rebug Toolbox. If you have firmware 4.82, optionally see also [1]. If you have firmware 4.84, optionally see also [2].
Tools
Whovian Note: FIX THE BULLET POINTS
Requirements: Soft/hardmodded PS3 running a custom firmware to dump the ISO to an external USB drive.
- Compatible PS3 Console (As of writing, all consoles can be modded while on latest firmware, which is 4.84)
* If you get a Slim made in 2011 or later, you will be able to do less than a console made in 2010 or earlier.
* "Everything below 2500 Series, like 2000 Series Slim, are all hackable ;)" [3]
- MultiMAN 04.20.00 or higher - Get the "Base" file
- GetKey r2
Dumping ISO using MultiMAN
- In XMMB display mode, go to multiMAN > File Manager / mmOS.
- In the Start Menu icon (look at the MultiMAN icon in the left botton of the screen and click it), select 'Enable Direct Disc Access' (with the game disc inserted).
- Double-click the Games icon to switch back to XMMB display mode. In the multiMAN column, select 'Refresh'.
- Now go to the Video column. It should now show a BD/DVD entry. Go to it, and select the 'Create ISO' option.
- You can now copy the ISO to your preferred destination. For the best speeds, select the internal HDD.
- Once it is dumped, you can use File Manager to copy/paste the ISO from the PS3ISO folder to your USB drive.
- If your destination is FAT, >4GB ISO's that are split into segments have to be combined again (using e.g. copy /b).
Dumping metadata using Getkey
- Download latest version of Rebug Toolbox from [4] (reinstall if necessary).
- Once you install the Toolbox PKG, you should be able to see the app installed on the XMB. Launch it. Once you are inside, move to the right over the options till the "Utilities" icon options displays. Then go down till you spot the following options:
1. "Dump eid root key (dump eid root key at dev_hdd0/game/RBGTLBOX2/USRDIR/eid_root_key)". Once you push it, the console will create a file called "eid_root_key" on the mentioned route. * NOTE: the eid_root_key is console specific.
Next, get a copy of the eid_root_key file:
- Transfer to your computer via FTP: You can FTP into your console to copy the eid_root_key to your computer.
- Transfer to your thumb drive via Console: Use MultiMAN File Manager or any tool to move inside the PS3 file system to get inside the RBGTLBOX2 folder. Make sure you have a USB drive connected to the PS3. Copy the Eid Root Key and paste it to the USB drive route (should be something like /dev_usb000).
2. "Export Flash to File (Backup your current NOR/NAND flash to /dev_usb000)". As soon as you enter the option, the system will ask you to "Please insert a USB drive (/dev_usb000) with at least 256mb free and try again!". Make sure you have a USB drive (if posible, on Fat32 format) connected to the correct usb port (the right-most usb port). Try till you hit the correct port and the dumping process will start.
- If everything was done correctly, once you pop the USB into a computer you should have two files: "eid_root_key" and something like this "20181219-130200-FLASH-NOR-FW.81" (The FW numbers depends on your firmware, in my case, i did it with FW 4.81).
- Fire up an Hex Editor app. We will use "HxD" for example [5].
- Once HxD is launched, go to "Open" and search for your NOR/NAND dump file. Open it.
- Once is loaded, hit CTRL+G and type in "303A0" if you're on NOR or "81BA0" if on NAND. (Note: If you didnt understand this, just write and search "303A0", when you start hex-editing the file, you are on NOR)
- At the left column, you should see the Offsets are displayed and the one we were looking, 0x00303A0 (for NOR in this case), will be there. Copy the 0x30 bytes from that offset and paste them into a new file AKA mark the 0x00303A0, 0x00303B0 and 0x00303C0 lines from "00" to "0F" values and copy them (CTRL+C). Go to File > New and a clean sheet will open. Paste (CTRL+V) the content and keep it opened.
This would be a visual example of what are you looking for. Mind you only need to search and copy the NOR bytes or the NAND bytes, not both (taken from: http://www.psdevwiki.com/ps3/Flash:Encrypted_Individual_Data_-_eEID):
NOR: 0x00303A0 - 0x00303CF | NAND: 0x0081BA0 - 0x0081BCF |
---|---|
Offset(h) 00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F 000303A0 8B D7 1B A0 C3 DA 4B BE B3 72 AE 61 78 90 31 1F ‹×. ÃÚK¾³r®ax.1. 000303B0 2E CD F1 92 28 8E 17 AD 6A 9C D5 8A 8E 17 86 39 .Íñ’(Ž.jœÕŠŽ.†9 000303C0 C8 0A F7 9B 92 D8 3A A8 92 60 73 6A 5E 12 2A 94 È.÷›’Ø:¨’`sj^.*” | Offset(h) 00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F |
- Now, go to "File" > "Open" and search the EID root key file. Once is opened, do CTRL+A to select all the content and copy it (CTRL+C). Go to the previous sheet we created (the one where we pasted NOR/NAND bytes) and just paste (CTRL+V), making the bytes from the eid root key appear under the NOR/NAND ones. Go to "File" > "Save" and rename this file as "3Dump.bin"
- Take your "3Dump.bin" file and place it on the root folder of the USB drive.
- Plug your USB drive into the right-most USB port (/dev_usb000/).
- Launch GetKey from XMB (with the game disc inserted): it'll run and exit back to XMB.
- It creates two files on the root of the USB drive: disc.pic & getkey.log
- The getkey.log file will contain the disc_key, disc_id and PIC. If anything went wrong creating the 3Dump.bin or extracting the data, the "getkey.log" will contain a WARNING message saying the process failed.
- Make sure that you provide the complete and correct metadata for each dump.