Posted by
Slynk
| Posted in
Security
| Posted on
1:48 AM
There are many methods to accomplish qa and I'm too lazy to document them all so I'll tell you one way. Linux.
PS3
Step 1) Install OtherOS++, install linux, make sure to enable the ps3 modules when compiling the kernel.
Step 2) Download, and compile the ps3dm utils
PC
Step 3) Download my tokenator
PS3
Step 4) Dump your eid by running ./ps3dm_iim /dev/ps3dmproxy get_data 0x0>dump
Step 5) Set your flag by running ./ps3dm_um /dev/ps3dmproxy write_eprom 0x48C0A 0x00
PC
Step 6) Open your dump in a hex editor and type in the first 16 bytes into tokenator
PS3
Step 7) Run the script it spits out
PS3 Step 8) Restart your ps3. Go to the Network Settings options and press L1 + L2 + L3 + R1 + R2 + D-Pad Down
Have fun. It doesn't work on rebug yet. There are other flags to set for debug firmwares and rebug is pseudo debug.
Posted by
Slynk
| Posted in
Security
| Posted on
9:42 PM
First off, I will not help you obtain a copy of IDA. Go buy it.
http://www.mediafire.com/?kb3s14zi6hramrx
Extract the contents into your IDA folder. I don't take credit for these plugins and loaders.
Loading a File
There are two file types I'll teach you to load. SPU and ELF files.
SPU files can only loaded in IDA 32bit mode. When you load IDA choose "Go" and drag the file onto IDA. Make sure elf is highlighted at the top. In processor type, choose "IBM SPU Cell Processor: spu." Click set. Click OK. "Undefined or unknown...blabla" yes. You should be good to go.
Elf files can be loaded in either 32 or 64 bit mode. When you load IDA choose "Go" and drag the file onto IDA. Make sure PlayStation 3 ELF is highlighted at the top. Don't mess with the processor type. Kernel option 1 check "Create function if data xref data-> code32 exists.
Optional: I don't know what these do but I turn them on anyways XD In kernel option 2 choose "Coagulate data segments in the final pass", "Perform 'no-return' analysis", and "Perform full stack pointer analysis."
Click OK. Sometimes you get a better result from running the analyze_self script. (File->IDC File->C:/Program Files/IDA/idc/analyze_self.idc) Hit yes, copy the TOC Address it shows you and click OK. Go to Options->General->Analysis->Processor specific analysis options. Type the TOC address in (I use 0: instead of 0x to be safe. No clue if it makes a difference.) While you're at it click "Create subi instructions. Click OK. Click Reanalyze Program. Click OK. And wait.
You'll know when a script is done because at the bottom left it's say "AU: idle".
IDA Basics
Just a few things. The program is expansive and I'd love to get to know more about it but here's a few things I know. Hex view and IDA view are connected. That means if you find a string in hex view, you can see it in IDA view. This won't show you magically where it's used at but sometimes, that string is xrefed. If under the string you see "# DATA XREF: " you can right click the ":off_XXXX" at the end, and choose XREF To or From. To, will give you a graph of any functions that have a call "to" that offset. From give's a graph of offset's called "from" that offset (mostly only useful for viewing a graph of where all a function leads to.)
In IDA view, you can search for either an immediate value, a string, or a byte sequence. I've never "not" checked "find all occurrences." Don't know why you wouldn't want to. It'll return a list of occurrences in its own window.
If you're lucky, the file you scanned will have some of the functions named (something other than sub_, nullsub_, or start). These are known functions that are defined in the ps3 sdk.
When exiting, always make sure, unless you WANT to re analyze the whole file again, to choose one of the Pack database options and Collect garbage.
Posted by
Slynk
| Posted in
Security
| Posted on
2:23 AM
I'd like to begin this post with a few comments.
- Only a little bit of this is my own findings, a lot of this info was found from other sources.
- NPDRM discussion does not have to be a topic of piracy, it can be used in conjunction with signing/encrypting homebrew if it is fully documented one day.
- This is mostly to bring together the bits of info scattered across the interwebs.
NPDRM Types
NP 3 is a free licensed app. It has no license check. No edata/riff. Just install and use. This can be trial software as well.
NP 2 is a locally licensed app. First time activation must take place online. After which you'll have an edata/riff for that app and somehow this is connected to your act.dat.
NP1 is a network licensed app. It requires network authentication every time it is launched.
The offset for determining the NPDRM type of a self is at the NPDRM Header offset + 0x1C.
NPDRM Security
NPDRM as well as edata use AES, ECDSA, and CMAC for authenticity. These keys, with the exception of the CMAC key, are out there in the ether and can be found without much effort for someone who knows what they're doing. The specifics of the algorithm are still being researched but a few people have already figured it out; but of course they won't share their info.
AES and ECDSA are handle by appldr like always. CMAC is handle by one of vsh's modules. (Don't know which one, just adding it for completeness.)
Another form of security used in NPDRM is called a k_license. This is a 16 byte key that the developer makes that functions as sort of a "project key". It's used in all npdrm encrypted files within the project to prevent one of the files from being replaced by another project's file. It is also referred to as an SCE NPDRM Key.
NPDRM Header
The current known structure of the NPDRM Header:
typedef struct
{
byte[4] block_type; // this is 3(NPDRM)
byte[4] block_size; // this is 0x90(sizeof(Self_NPDRM))
byte[4] unknown1; // So far always 0
byte[4] unknown2; // So far always 0
byte[4] magic; // 0x4E504400(NPD)
byte[4] unknown3; // So far always 1
byte[4] license; // 1 Network License, 2 Local License, 3 Free
byte[4] type; // 1 Executable, 21 Update for Disc Based Game
byte[0x30] titleid;
byte[0x10] hash_unknown;
byte[0x10] hash1;
byte[0x10] hash2;
byte[0x10] padding;
} Self_NPDRM
I hear there's plenty of more info in the official sdk for anyone who legally owns it as well. Anyway, I'll post more if anything else comes to light. ^^
Posted by
Slynk
| Posted in
Security
| Posted on
4:36 PM
I'll keep this article simple for its target audience, the newbs. (That's not to be confused with noob.)
Learn about AES Encryption:
AES is an encryption that uses a key and an initialization "vector" to encrypt the file. The key can be 16 bytes (numbers, for simplicity), 24 bytes, or 32 bytes long. These numbers are the same as when you see AES-128, AES-192, and AES-256 respectively. The initialization vector is, at least in PS3 encryption, always 16 bytes.
AES can be used in a variety of "modes." Such as the PS3 uses AES in both CTR mode and CBC mode. Think of these as just... a different set of instructions for reading and writing the encrypted data.
Brute forcing AES is just out of the question. Think about this. If you had a 1 digit password, with a possibility ranging from 0-9, there would be 10 possibilities aka 10^1. If you had a 2 digit password, there would be 100 possibilities aka 10^2. 3 digits would be 1000.
Now with AES, each digit ranges from 0-255. Even if you used a 16 byte key, that would be 256^16 possible keys which is 3.4028236692093846346337460743177e+38. That's just for the key. If you don't know the initialization vector, because you need that too, there are (256^16)(256^16) possible combinations to cycle through. It's unrealistic with current hardware, even with a distributed attack.
Learn about Hashing:
Hashing's a pretty easy concept to understand. It's like a book summary. You get the gist of what's in the book but you couldn't replicate the entire book from that summary. It's the same with hashing. You generate a summary of the file, or part of the file, then store it to be checked later. Now the problem with this is if you know the algorithm used to calculate the hash, you might be able to tweak a file to loosly match it. Or anyone could easily just hash the file themselves and replace your hash. To avoid that, HMAC uses a key to encrypt the hash. If the person doesn't have the key, they can't replicate a similar file structure nor can they make their own hash.
Learn about ECDSA:
I'll be honest, I'm still learning about this. But from what I understand, this is for authenticity. You have 2 keys, the public key (the one you give to people to verify that the file that get is from you) and the private key (the key you use to sign the file.) Due to one of the parameters for generating the key not being random like it should be, the people could calculate private keys for the ps3 to sign their own files. This has since been fixed for most keys.
Posted by
Slynk
| Posted in
AXMT
| Posted on
3:21 AM
For those who live under a rock and don't watch Raocow play Super Mario World rom hacks, you probably wouldn't know he's also an artist with a large following. The community following raocow is full of skilled individuals who can sing, hack a rom, and even make some kick ass music.
With that said, these folks have taken an interest in making a custom editor / engine to a tune similar to SMBX. I am currently working with warioeagle to make a custom editor and engine for the community.
The editor and engine are being written in C#/XNA. It's still in a very early stage of development but I will post any updates as they arrive. Currently I'm working on a Player Editor that lets you set powerups, sprite sheets, and animations. It's mostly done, but I'm working out a few bugs and tweaking some things (such as allowing the designer to adjust the animation speed).
Posted by
Slynk
| Posted on
2:51 AM
I decided I really should have a site to chronicle anything I do. Especially if it was a point of interest to others. So what you can expect from this site:
- Tutorials on a wide range of topics from General Programming, to Game Development, to Security.
- Updates on current projects.
- Philosophical posts for when I'm feeling extra chatty.
- Probably other stuff as well.
I'm going to try and get a little income from this site so please excuse the one add at the bottom of my posts. I also have a link on the right as to how you can help me out. If I end up finding a job and can afford NOT to have adds, I will remove them. But until then, please ignore them. ^^;