PSP Decryption
PSP Decryption
I heard that the main boot ipl ( I have no idea what I'm talking about ) modules uses encryption during the booting of the psp. I'd like to try to break that encryption. Any ideas where I should start. I know it uses aes but I'd like to run a bruteforce attack on it. And maybe i'll get lucky :P. Help plz
-
- Posts: 110
- Joined: Tue Feb 27, 2007 9:43 pm
- Contact:
-
- Posts: 110
- Joined: Tue Feb 27, 2007 9:43 pm
- Contact:
-
- Posts: 18
- Joined: Sat Dec 05, 2009 1:02 am
-
- Posts: 110
- Joined: Tue Feb 27, 2007 9:43 pm
- Contact:
So basically you're question is how to get the kernel keys from the IPL? The IPL (on 1K and 2K) and can already be decrypted no problem (which ends up exposing the keys in the plain).
Regarding cracking the 3K, it depends what you mean by "cracking" it. The 3K can already run unsigned code via exploits. If you are asking what it takes to get Pandora to work on it:
Firstly the service mode trigger via the battery is now encrypted so that has to be figured out. That will enable the 3K to boot into service mode. The next step would be to figure out how to run unsigned code from the MS IPL. The exploit that Pandora relied on in the pre-IPL has now been patched on the 3K (and later model 2K's) so we cannot run custom IPL's.
It's unlikely there would exist another exploit in the pre-IPL that'll allow unsigned code to run however we are unable to dump the 3K pre-IPL to even search for one. That is also why the 3K IPL cannot be fully decrypted since it uses the contents of the pre-IPL as a seed to decrypt it.
So basically to 'crack' the 3K we need exploits or figure out how to sign code like Datel figured out.
EDIT: also could you be a little more specific when asking questions, your comments are a bit too vague to understand what exactly you are asking about.
Regarding cracking the 3K, it depends what you mean by "cracking" it. The 3K can already run unsigned code via exploits. If you are asking what it takes to get Pandora to work on it:
Firstly the service mode trigger via the battery is now encrypted so that has to be figured out. That will enable the 3K to boot into service mode. The next step would be to figure out how to run unsigned code from the MS IPL. The exploit that Pandora relied on in the pre-IPL has now been patched on the 3K (and later model 2K's) so we cannot run custom IPL's.
It's unlikely there would exist another exploit in the pre-IPL that'll allow unsigned code to run however we are unable to dump the 3K pre-IPL to even search for one. That is also why the 3K IPL cannot be fully decrypted since it uses the contents of the pre-IPL as a seed to decrypt it.
So basically to 'crack' the 3K we need exploits or figure out how to sign code like Datel figured out.
EDIT: also could you be a little more specific when asking questions, your comments are a bit too vague to understand what exactly you are asking about.