User:Whovian9369

From Redump Wiki

(Difference between revisions)
Jump to: navigation, search
m (Added a draft of an edit of the PS3 CFW 3.56+ guide -- NOT DONE YET)
m (Tools)
Line 15: Line 15:
===Tools===
===Tools===
 +
Whovian Note: FIX THE BULLET POINTS
Requirements: Soft/hardmodded PS3 running a custom firmware to dump the ISO to an external USB drive.
Requirements: Soft/hardmodded PS3 running a custom firmware to dump the ISO to an external USB drive.
* Compatible PS3 Console (As of writing, all consoles can be modded while on latest firmware, which is 4.84)
* Compatible PS3 Console (As of writing, all consoles can be modded while on latest firmware, which is 4.84)

Revision as of 04:04, 2 June 2019

This is my User Page. I'm mainly using it as a scratch pad for any "big" wiki edits. :)



Placeholder.



Contents

Dumping with a PS3 Console with CFW 3.56 or Newer

Assuming you have Rebug CFW installed, it's really easy and you can do it mainly in Rebug Toolbox. If you have firmware 4.82, optionally see also [1]. If you have firmware 4.84, optionally see also [2].

Tools

Whovian Note: FIX THE BULLET POINTS Requirements: Soft/hardmodded PS3 running a custom firmware to dump the ISO to an external USB drive.

  • Compatible PS3 Console (As of writing, all consoles can be modded while on latest firmware, which is 4.84)

* If you get a Slim made in 2011 or later, you will be able to do less than a console made in 2010 or earlier. * "Everything below 2500 Series, like 2000 Series Slim, are all hackable ;)" [3]

Dumping ISO using MultiMAN

  • In XMMB display mode, go to multiMAN > File Manager / mmOS.
  • In the Start Menu icon (look at the MultiMAN icon in the left botton of the screen and click it), select 'Enable Direct Disc Access' (with the game disc inserted).
  • Double-click the Games icon to switch back to XMMB display mode. In the multiMAN column, select 'Refresh'.
  • Now go to the Video column. It should now show a BD/DVD entry. Go to it, and select the 'Create ISO' option.
  • You can now copy the ISO to your preferred destination. For the best speeds, select the internal HDD.
  • Once it is dumped, you can use File Manager to copy/paste the ISO from the PS3ISO folder to your USB drive.
  • If your destination is FAT, >4GB ISO's that are split into segments have to be combined again (using e.g. copy /b).

Dumping metadata using Getkey

  • Download latest version of Rebug Toolbox from [4] (reinstall if necessary).
  • Once you install the Toolbox PKG, you should be able to see the app installed on the XMB. Launch it. Once you are inside, move to the right over the options till the "Utilities" icon options displays. Then go down till you spot the following options:

1. "Dump eid root key (dump eid root key at dev_hdd0/game/RBGTLBOX2/USRDIR/eid_root_key)". Once you push it, the console will create a file called "eid_root_key" on the mentioned route. * NOTE: the eid_root_key is console specific.

Next, get a copy of the eid_root_key file:

    • Transfer to your computer via FTP: You can FTP into your console to copy the eid_root_key to your computer.
    • Transfer to your thumb drive via Console: Use MultiMAN File Manager or any tool to move inside the PS3 file system to get inside the RBGTLBOX2 folder. Make sure you have a USB drive connected to the PS3. Copy the Eid Root Key and paste it to the USB drive route (should be something like /dev_usb000).

2. "Export Flash to File (Backup your current NOR/NAND flash to /dev_usb000)". As soon as you enter the option, the system will ask you to "Please insert a USB drive (/dev_usb000) with at least 256mb free and try again!". Make sure you have a USB drive (if posible, on Fat32 format) connected to the correct usb port (the right-most usb port). Try till you hit the correct port and the dumping process will start.

  • If everything was done correctly, once you pop the USB into a computer you should have two files: "eid_root_key" and something like this "20181219-130200-FLASH-NOR-FW.81" (The FW numbers depends on your firmware, in my case, i did it with FW 4.81).
  • Fire up an Hex Editor app. We will use "HxD" for example [5].
  • Once HxD is launched, go to "Open" and search for your NOR/NAND dump file. Open it.
  • Once is loaded, hit CTRL+G and type in "303A0" if you're on NOR or "81BA0" if on NAND. (Note: If you didnt understand this, just write and search "303A0", when you start hex-editing the file, you are on NOR)
  • At the left column, you should see the Offsets are displayed and the one we were looking, 0x00303A0 (for NOR in this case), will be there. Copy the 0x30 bytes from that offset and paste them into a new file AKA mark the 0x00303A0, 0x00303B0 and 0x00303C0 lines from "00" to "0F" values and copy them (CTRL+C). Go to File > New and a clean sheet will open. Paste (CTRL+V) the content and keep it opened.

This would be a visual example of what are you looking for. Mind you only need to search and copy the NOR bytes or the NAND bytes, not both (taken from: http://www.psdevwiki.com/ps3/Flash:Encrypted_Individual_Data_-_eEID):

NOR: 0x00303A0 - 0x00303CF NAND: 0x0081BA0 - 0x0081BCF
Offset(h) 00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F
   
000303A0  8B D7 1B A0 C3 DA 4B BE B3 72 AE 61 78 90 31 1F  ‹×. ÃÚK¾³r®ax.1.
000303B0  2E CD F1 92 28 8E 17 AD 6A 9C D5 8A 8E 17 86 39  .Íñ’(Ž.­jœÕŠŽ.†9
000303C0  C8 0A F7 9B 92 D8 3A A8 92 60 73 6A 5E 12 2A 94  È.÷›’Ø:¨’`sj^.*”
Offset(h) 00 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0F

00081BA0 40 9F 75 39 22 96 C2 12 A2 9C BC CF 53 99 73 40 @Ÿu9"–Â.¢œ¼ÏS™s@ 00081BB0 5D AD A7 F6 26 6E 50 35 55 A8 8A B9 24 A1 F5 35 ]­§ö&nP5U¨Š¹$¡õ5

00081BC0 BC 3B 7A 88 17 75 9C 44 A9 2D 4B E0 8B 80 92 E7 ¼;zˆ.uœD©-Kà‹€’ç
  • Now, go to "File" > "Open" and search the EID root key file. Once is opened, do CTRL+A to select all the content and copy it (CTRL+C). Go to the previous sheet we created (the one where we pasted NOR/NAND bytes) and just paste (CTRL+V), making the bytes from the eid root key appear under the NOR/NAND ones. Go to "File" > "Save" and rename this file as "3Dump.bin"
  • Take your "3Dump.bin" file and place it on the root folder of the USB drive.
  • Plug your USB drive into the right-most USB port (/dev_usb000/).
  • Launch GetKey from XMB (with the game disc inserted): it'll run and exit back to XMB.
  • It creates two files on the root of the USB drive: disc.pic & getkey.log
  • The getkey.log file will contain the disc_key, disc_id and PIC. If anything went wrong creating the 3Dump.bin or extracting the data, the "getkey.log" will contain a WARNING message saying the process failed.
  • Make sure that you provide the complete and correct metadata for each dump.
Personal tools