From Redump Wiki
This is my User Page. I'm mainly using it as a scratch pad for any "big" wiki edits. :)
Dumping with a PS3 Console with CFW 3.56 or Newer
Assuming you have Rebug CFW installed, it's really easy and you can do it mainly in Rebug Toolbox. If you have firmware 4.82, optionally see also . If you have firmware 4.84, optionally see also .
Whovian Note: FIX THE BULLET POINTS
Requirements: Soft/hardmodded PS3 running a custom firmware to dump the ISO to an external USB drive.
- Compatible PS3 Console (As of writing, most consoles can be modded while on latest firmware, which is 4.84)
- If you get a Slim made in 2011 or later, you will be able to do less than a console made in 2010 or earlier.
- "Everything below 2500 Series, like 2000 Series Slim, are all hackable ;)" 
Dumping ISO using MultiMAN
- In the main display mode, which will be called the XMMB from here, go to the far left category called "mmCM" and select the menu option "File Manager / mmOS".
- You should now be on something that looks like a computer desktop
- Use the RIGHT joystick to move the cursor around
- Insert a game disc
- In the Start Menu (look at the MultiMAN icon in the bottom left of the screen, and click that button), select 'Enable Direct Disc Access'
- Double-click the Games icon to switch back to XMMB display mode. In the mmCM category (on the far left), select 'Refresh'.
- The "Refresh" option is right under the "File Manager / mmOS" option in that category.
- Now go to the Video column. It should now show a new BD/DVD entry. Go to that new option, and hit Triangle.
- Select the 'Create ISO' option in that newly opened menu.
- Create the ISO to your preferred destination.
- For the best speeds, you should select the internal HDD.
- Once the dump has finished, you can use the MultiMAN File Manager to copy/paste the ISO from the HDD's PS3ISO folder (dev_hdd0/PS3ISO/) to your USB drive.
- When you hover over the file you want, hit CIRCLE to open the menu to do that
- If your destination is FAT32, Multiman will automatically split any files bigger into multiple parts. Those files have to be combined again.
- Suggested methods of doing this are the following:
cd <directory> copy /b GAME.iso.* GAME.ISO
Linux / macOS:
cd <directory> cat GAME.iso.* > GAME.ISO
Dumping metadata using Getkey
- Download latest version of Rebug Toolbox from  (reinstall if necessary).
- Once you install the Toolbox PKG, you should be able to see the app installed on the XMB. Launch it. Once you are inside, move to the right over the options till the "Utilities" icon options displays. Then go down till you spot the following options:
- "Dump eid root key (dump eid root key at dev_hdd0/game/RBGTLBOX2/USRDIR/eid_root_key)". Once you push it, the console will create a file called "eid_root_key" on the mentioned route.
- NOTE: the eid_root_key is console specific.
Next, get a copy of the eid_root_key file:
- Transfer to your computer via FTP: While booted into Rebug Toolbox or MultiMAN, you can FTP into your console to copy the eid_root_key to your computer.
- Transfer to your thumb drive via Console:
- Use MultiMAN File Manager or any similar tool to move inside the PS3 file system to get inside the RBGTLBOX2 folder.
- Make sure you have a USB drive connected to the PS3. Copy the Eid Root Key and paste it to the USB drive route (should be something like /dev_usb000).
- "Export Flash to File (Backup your current NOR/NAND flash to /dev_usb000)". As soon as you enter the option, the system will ask you to "Please insert a USB drive (/dev_usb000) with at least 256mb free and try again!".
- Make sure you have a USB drive (if posible, on Fat32 format) connected to the correct usb port (the right-most usb port). Try till you hit the correct port and the dumping process will start.
- If everything was done correctly, once you pop the USB into a computer you should have two files: "eid_root_key" and something like this "20181219-130200-FLASH-NOR-FW.81" (The FW numbers depends on your firmware, in my case, i did it with FW 4.81).
- Fire up an Hex Editor app. We will use "HxD" for example .
- Once HxD is launched, go to "Open" and search for your NOR/NAND dump file. Open it.
- Once is loaded, hit CTRL+G and type in "303A0" if you're on NOR or "81BA0" if on NAND. (Note: If you didnt understand this, just write and search "303A0", when you start hex-editing the file, you are on NOR)
- At the left column, you should see the Offsets are displayed and the one we were looking, 0x00303A0 (for NOR in this case), will be there. Copy the 0x30 bytes from that offset and paste them into a new file AKA mark the 0x00303A0, 0x00303B0 and 0x00303C0 lines from "00" to "0F" values and copy them (CTRL+C). Go to File > New and a clean sheet will open. Paste (CTRL+V) the content and keep it opened.
This would be a visual example of what are you looking for. Mind you only need to search and copy the NOR bytes or the NAND bytes, not both (taken from: http://www.psdevwiki.com/ps3/Flash:Encrypted_Individual_Data_-_eEID):
|NOR: 0x00303A0 - 0x00303CF||NAND: 0x0081BA0 - 0x0081BCF|
Offset(h) 00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F 000303A0 8B D7 1B A0 C3 DA 4B BE B3 72 AE 61 78 90 31 1F ‹×. ÃÚK¾³r®ax.1. 000303B0 2E CD F1 92 28 8E 17 AD 6A 9C D5 8A 8E 17 86 39 .Íñ’(Ž.jœÕŠŽ.†9 000303C0 C8 0A F7 9B 92 D8 3A A8 92 60 73 6A 5E 12 2A 94 È.÷›’Ø:¨’`sj^.*”
Offset(h) 00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F
- Now, go to "File" > "Open" and search for the EID root key file. Once is opened, do CTRL+A to select all the content and copy it (CTRL+C). Go to the previous sheet, the one where we pasted NOR/NAND bytes, and just paste (CTRL+V) the bytes from eid root key file, making the bytes from the eid root key appear under the NOR/NAND ones.
- Go to "File" > "Save" and rename this file as "3Dump.bin"
- Take your "3Dump.bin" file and place it on the root folder of the USB drive.
- Plug your USB drive into the right-most USB port (/dev_usb000/).
- Launch GetKey from XMB (with the game disc inserted): it'll run and exit back to XMB.
- It creates two files on the root of the USB drive: disc.pic & getkey.log
- The getkey.log file will contain the disc_key, disc_id and PIC. If anything went wrong creating the 3Dump.bin or extracting the data, the "getkey.log" will contain a WARNING message saying the process failed.
- Keep those files safe, and likely next to the games that they go with. You will need that game specific info when you submit the disc.