› Foros › PlayStation 3 › Modchips y Softmods
LUCKYMAS escribió:Que chip? Este hilo es para flasheo , peto si la abrio por lo que comentas es rebaling
Psmaniaco escribió:sotolandia escribió:Pero eso como lo,hago con un hard reset , por que eso ya lo he hecho
sotolandia escribió:Psmaniaco escribió:sotolandia escribió:Pero eso como lo,hago con un hard reset , por que eso ya lo he hecho
Bufff, ¿te sincroniza el mando al conectarlo
Me he fijado , y he conectado el,mando y si que enciendo la consola desde este con el cable puesto pero no se queda la luz fija marcando el numero de mando que es. Se queda parpadeante el mando y al final se apaga el mando.
cocox escribió:hola, tengo entendido que el downgrade es posible en consolas de los modelos 25xx y posteriores.
mi pregunta, al dia de hoy esto continua asi? aun no se pueden downgradear o instalar un CFW a consolas con OFW superior a 3.55? gracias por su apoyo!!!
Psmaniaco escribió:cocox escribió:hola, tengo entendido que el downgrade es posible en consolas de los modelos 25xx y posteriores.
mi pregunta, al dia de hoy esto continua asi? aun no se pueden downgradear o instalar un CFW a consolas con OFW superior a 3.55? gracias por su apoyo!!!
Querras decir anteriores, los posteriores solo es posible modificarla para cargar backups con los ODDE, es decir en las que lleven el OFW 3.60 en adelante imposible de momento.
Un saludo.
OFFSET: 0xEBFFF0 --- VALUE: 0xF7 --- cvtrm 0xFF UNREFERENCED
OFFSET: 0xEC0006 --- VALUE: 0xF7 --- VTRM0 0xFF UNREFERENCED
OFFSET: 0xEC4000 --- VALUE: 0x000000005E545A4D00000000000000 --- VTRM0 MAGIC
OFFSET: 0xEC4028 --- VALUE: 0x0000000000000A09 --- VTRM0 RESERVED ENTRIES
OFFSET: 0xEC8000 --- VALUE: 0xF7 --- VTRM0 0xFF UNREFERENCED
OFFSET: 0xEE0006 --- VALUE: 0xF7 --- VTRM1 0xFF UNREFERENCED
OFFSET: 0xEE51A8 --- VALUE: 0xF7 --- VTRM1 0xFF UNREFERENCED
OFFSET: 0xF00010 --- VALUE: 0x0000000007ACE0FF00000000D6ADF2CE --- 0FACE0FF DEADFACE MAGIC
OFFSET: 0xF000C0 --- VALUE: 0x00000000000071000000000000000100 --- 0FACE0FF DEADFACE SECTOR START
OFFSET: 0xF00150 --- VALUE: 0x00000000000072000000000000000400 --- 0FACE0FF DEADFACE SECTOR START
OFFSET: 0xF01000 --- VALUE: 0xF7 --- 0xFF UNREFERENCED
OFFSET: 0xF20000 --- VALUE: 0x4345444C57455054464F525F41524541 --- CELL_EXTNOR_AREA
OFFSET: 0xF40000 --- VALUE: 0x000000010000002C664715E8309BC016656E04375425F67B229A31757222632B31DD15AA607DE3F5F7A3740B95DD333A --- CRL1 HASH
OFFSET: 0xF78000 --- VALUE: 0xF7 --- DRL1 0xFF UNREFERENCED
OFFSET: 0xF80000 --- VALUE: 0x000000010000002C664715E8309BC016656E04375425F67B229A31757222632B31DD15AA607DE3F5F7A3740B95DD333A --- CRL2 HASH
OFFSET: 0xFA9C00 --- VALUE: 0xF7 --- DRL2 0xFF UNREFERENCED
OFFSET: 0xFC0000 --- VALUE: 0x0000274BC39E152420B447D2F13FB443 --- bootldr BINARYSIZE/REVISIONKEY
OFFSET: 0xFC0010 --- VALUE: 0x274B --- bootldr BINARYSIZE
OFFSET: 0xFE74F0 --- VALUE: 0xD0 --- bootldr 0xFF UNREFERENCED
Standard deviation to high --- bootldr
********************************************
PS3 Dump Checker v1.0 (Build: 250)
Check started: 26/02/2014 09:27:17
********************************************
09:27:17 : Reading image into memory and checking statistics...
09:27:17 : Statistics check skipped! (nothing to check)
09:27:17 : Binary check Started!
09:27:17 : Binary check for Header Magic0 Started... Result: OK!
09:27:17 : Binary check for Header Magic1 Started... Result: FAILED! Header Magic1
Offset: 0xF00010
Expected data:
00 00 00 00 0F AC E0 FF 00 00 00 00 DE AD FA CE
Actual data: 00 00 00 00 AC 07 FF E0 00 00 00 00 AD D6 CE F2
09:27:17 : Binary check for Flash Format Started... Result: OK!
09:27:17 : Binary check for asecure_loader Started... Result: OK!
09:27:17 : Binary check for eEID Started... Result: OK!
09:27:17 : Binary check for cISD Started... Result: OK!
09:27:17 : Binary check for cCSD Started... Result: OK!
09:27:17 : Binary check for trvk_prg0 Started... Result: OK!
09:27:17 : Binary check for trvk_prg1 Started... Result: OK!
09:27:17 : Binary check for trvk_pkg0 Started... Result: OK!
09:27:17 : Binary check for trvk_pkg1 Started... Result: OK!
09:27:17 : Binary check for ros0 Started... Result: OK!
09:27:17 : Binary check for ros1 Started... Result: OK!
09:27:17 : Binary check for cvtrm Started... Result: OK!
09:27:17 : Binary check for metldr Header Started... Result: OK!
09:27:17 : Binary check for asecure_loader Header Started... Result: OK!
09:27:17 : Binary check for eEID Header Started... Result: OK!
09:27:17 : Binary check for cISD Header Started... Result: OK!
09:27:17 : Binary check for cCSD Header Started... Result: OK!
09:27:17 : Binary check for trvk_prg0 SCE Started... Result: OK!
09:27:17 : Binary check for trvk_prg1 SCE Started... Result: OK!
09:27:17 : Binary check for trvk_pkg0 SCE Started... Result: OK!
09:27:17 : Binary check for trvk_pkg1 SCE Started... Result: OK!
09:27:17 : Binary check for ros0 Header Started... Result: OK!
09:27:17 : Binary check for ros1 Header Started... Result: FAILED!
Offset: 0x7C0000
Expected data:
00 00 00 00 00 00 00 00 00 00 00 00 00 6F FF E0
Actual data: 00 00 00 00 00 00 00 00 00 00 00 00 6F 00 E0 F7
09:27:17 : Binary check for cvtrm header Started... Result: FAILED!
Offset: 0xEC0000
53 43 45 49 FF FF FF FF FF FF FF FF FF FF FF FF
00 00 00 00 FF FD FF FF FF FF FF FF FF FF FF FF
Actual data: 00 00 00 00 FD F7 FF F7 FF F7 FF F7 FF F7 FF F7
09:27:17 : Binary check for IDPS/Target_ID Started... Result: OK!
09:27:17 : Binary check for metldr0 Started... Result: OK!
09:27:17 : Binary check for metldr1 Started... Result: OK!
09:27:17 : Binary check for bootldr0 Started... Result: FAILED!
Offset: 0xFC0002
2F 13
2F 3B
2F 4B
2F 53
2E E3
2E AB
2E B3
2F 13
2F 4B
2F 1C
2E F4
2F 5B
2F FB
30 1B
Actual data: 4B 27
09:27:17 : Binary check for bootldr1 Started... Result: FAILED!
Offset: 0xFC0012
2F 13
2F 3B
2F 4B
2F 53
2E E3
2E AB
2E B3
2F 13
2F 4B
2F 1C
2E F4
2F 5B
2F FB
30 1B
Actual data: 4B 27
09:27:18 : Data check Started!
09:27:18 : Data check for PS3DumpChecker.Common+DataCheck Started... Result: OK!
09:27:18 : Data check for PS3DumpChecker.Common+DataCheck Started... Result: OK!
09:27:18 : SKU List check Started!
09:27:18 : No matching SKU model found!
09:27:18 : idps = 0B
09:27:18 : metldr0 = E920
09:27:18 : metldr1 = 0E8E
09:27:18 : bootldr0 = 274B
09:27:18 : bootldr1 = 274B
09:27:18 : bootldrsize = 274F0
09:27:18 : All checks (33 Checks) have been completed after 0 Minutes 0 Seconds and 715 Milliseconds
Bad count: 6 of 33 Tests Check result: Failed!
Filename: bkpps3_swapped.bin
MD5: EBC86EE133B1BB75BCCE246823505337
File Size: 16777216
Validator Version: 1.31
=======================================================================
First Region Header:
Unknown Blank - ✔
Magic Header - 0FACE0FF - DEADBEEF ✔
Region Count - 00 ✔
Unknown - 00 ✔
Blank Filled Block - ✔
Flash Format:
Format/Version - IFI '120' ✔
Filled Block - ✔
Return
Flash-Region Table:
Count - 11 ✔
Length - EFFC00 ✔
asecure_loader ✔
Size: 02E800 ✔
Location: 000400 (0x800) ✔
eEID ✔
Size: 010000 ✔
Location: 02EC00 (0x2F000) ✔
cISD ✔
Size: 000800 ✔
Location: 03EC00 (0x3F000) ✔
cCSD ✔
Size: 000800 ✔
Location: 03F400 (0x3F800) ✔
trvk_prg0 ✔
Size: 020000 ✔
Location: 03FC00 (0x40000) ✔
trvk_prg1 ✔
Size: 020000 ✔
Location: 05FC00 (0x60000) ✔
trvk_pkg0 ✔
Size: 020000 ✔
Location: 07FC00 (0x80000) ✔
trvk_pkg1 ✔
Size: 020000 ✔
Location: 09FC00 (0xA0000) ✔
ros0 ✔
Size: 700000 ✔
Location: 0BFC00 (0xC0000) ✔
ros1 ✔
Size: 700000 ✔
Location: 7BFC00 (0x7C0000) ✔
cvtrm ✔
Size: 040000 ✔
Location: EBFC00 (0xEC0000) ✔
Structure/Corruption Check - ✔
Asecure_Loader/Metldr:
File Length - 0E8E ✔
Encrypted Binary Size - E920 ✔
Decrypted Binary Size - 0E8E ✔
File Name - metldr ✔
Calculated Metldr Size - E920 ✔
Rev Key - 99873BC715F280809C302225 (CECH20xx/CECH21xx/CECH25xx (DYN-001/SUR-001/JSD/JTP-001)) ✔
PerConsole Nonce - 7E585BF731356E1AC9D80D4F ✔
Metldr Version - Metldr Old - Downgradeable ✔
Blank Filled Block - ✔
Asecure_Loader/Metldr Corrupt Sequence Check:
Nothing Found! ✔
Asecure_Loader/Metldr Encrypted Statistics:
Sum: 59680 ✔
Mean: 233.125 ✔
Std Dev: 15.3679064618317 ✔
Entropy: 7.99687778841083 Bits ✔
Encrypted Individual Data:
Entries - 06 ✔
eEID Package Length - 1DD0 ✔
Blank Filler - ✔
EID Entry Table:
EID0
Entry Point - 0070 ✔
Length - 0860 ✔
EID Number - 0 ✔
EID1
Entry Point - 08D0 ✔
Length - 02A0 ✔
EID Number - 1 ✔
EID2
Entry Point - 0B70 ✔
Length - 0730 ✔
EID Number - 2 ✔
EID3
Entry Point - 12A0 ✔
Length - 0100 ✔
EID Number - 3 ✔
EID4
Entry Point - 13A0 ✔
Length - 0030 ✔
EID Number - 4 ✔
EID5
Entry Point - 13D0 ✔
Length - 0A00 ✔
EID Number - 5 ✔
EID0:
IDPS - ✔
PerConsole Nonce - 7E585BF731356E1AC9D80D4F ✔
Static + Count - 0012000B (11) ✔
EID Data Entropy: 7.89929490000347 Bits ✔
EID1:
EID Data Entropy: 7.70455362422806 Bits ✔
EID2:
P-Block Size - 0080 ✔
S-Block Size - 0690 ✔
Padding ✔
EID Data Entropy: 7.89930137208974 Bits ✔
EID3:
Content Availiability - 00000001 ✔
Indicating/Build ID - 9E8F1B15 ✔
CKP_Management_ID - 0000000002E2F33B ✔
PerConsole Nonce - 7E585BF731356E1AC9D80D4F ✔
Unknown Static - 000100D0 ✔
EID Data Entropy: 7.02903857142766 Bits ✔
EID4:
128bit Key - 348AB743AAE4807EB01A263B055FED5C ✔
128bit Key - C39BF5D6896351CDB71202F17F78647D ✔
CMAC-OMAC1 - A2325999CD22CE7E6540480D81A076CF ✔
EID Data Entropy: 5.45996250072116 Bits ✔
EID5:
IDPS - ✔
PerConsole Nonce - 7E585BF731356E1AC9D80D4F ✔
Unknown Static - 00120730 ✔
EID Data Entropy: 7.93145116468345 Bits ✔
EID Unreferenced Area:
Filled - ✔
IDPS Info:
Target ID - 84 (Retail / Kiosk USA / CEX UC2) ✔
Model - 0B (CECH25xx (JTP-001 or JSD-001)) ✔
IDPS - EID0 & EID5 ✔
Console Individual System Data:
Entries - 03 ✔
cISD Package Length - 0270 ✔
Blank Filler - ✔
cISD Entry Table:
cISD0
Entry Point - 0040 ✔
Length - 0020 ✔
cISD Number - 0 ✔
cISD1
Entry Point - 0060 ✔
Length - 0200 ✔
cISD Number - 1 ✔
cISD2
Entry Point - 0260 ✔
Length - 0010 ✔
cISD Number - 2 ✔
CISD0:
MAC Address - A8E3EEEB5E87 ✔
Unknown Static - ✔
CISD1:
IDLog Header - 7F49444C (IDL) ✔
Unknown Static -0002 ✔
Area Start - 0100 ✔
Unknown Static - 7F49 ✔
Unknown Static - 0001 ✔
ECID - 01C524018B05370E09057B4200000000 ✔
Board ID - 27456405 ✔
Kiban ID - 3J5N0191373E ✔
Unknown ID - 011101110138 ✔
CKP2 Data - 0001 ✔
Unknown Static Block - ✔
Unknown Semi Static ID - 0002001100020012 ✔
CKP Management ID - 0000000002E2F33B ✔
Unknown Data - ✔
Availiable Area - ✔
CISD2:
WLAN Channel - 07FF ✔
WLAN Filler - ✔
Unreferenced Area - ✔
CISD Unreferenced Area:
Filled - ✔
Common System Data:
Entries - 01 ✔
CCSD Package Length - 0800 ✔
Blank Filler - ✔
CCSD Entry Table:
CCSD0
Entry Point - 0020 ✔
Length - 0030 ✔
CCSD Number - 0 ✔
CCSD0:
Structure - ✔
CCSD Unreferenced Area:
Unreferenced Area - ✔
Return
TRVK_PRG0:
Filler - ✔
Data Size - 02E0 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - E0 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space - ✔
TRVK_PRG1:
Filler - ✔
Data Size - 02E0 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - E0 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space - ✔
TRVK_PKG0:
Filler - ✔
Data Size - 0260 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - 60 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space - ✔
TRVK_PKG1:
Filler - ✔
Data Size - 0260 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - 60 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space - ✔
ROS0/1 Versions:
355.000 ✔
431.000 ✔
ROS0:
Header Filler - ✔
Length of Flash Region - 6FFFE0 ✔
Unknown Static - ✔
Entry Count - 18 ✔
Length of Flash Region 2 - 6FFFE0 ✔
ROS0 355.000 File Table; AuthID & MD5:
creserved_0 ✔
AuthID: N/A ✔
MD5: 09A1D434DBD7197E7C3AF8A7C28CA38B ✔
sdk_version ✔
AuthID: N/A ✔
MD5: 3DA12E2CB472EB8193309B663D7C913A ✔
lv1ldr ✔
AuthID: 1FF0000008000001 ✔
MD5: E9AE2A62B4CC31750D4E56C7D5FFDD6F ✔
lv2ldr ✔
AuthID: 1FF0000009000001 ✔
MD5: A597AA3D8101674856EEF83AC1D0EF28 ✔
isoldr ✔
AuthID: 1FF000000A000001 ✔
MD5: 811329ECDB677181B9FC5CC3564D9047 ✔
appldr ✔
AuthID: 1FF000000C000001 ✔
MD5: 5C7436BFFC7E8D0A8E210BD0CA83CDF2 ✔
spu_pkg_rvk_verifier.self ✔
AuthID: 1070000022000001 ✔
MD5: B76B7244B19032A9518787D9EC827F3C ✔
spu_token_processor.self ✔
AuthID: 1070000023000001 ✔
MD5: 22ABABCFC027F892AD2CF4E1C9FD925C ✔
spu_utoken_processor.self ✔
AuthID: 107000004C000001 ✔
MD5: 0E5A2E8A68FE09481D728C227DC5A165 ✔
sc_iso.self ✔
AuthID: 1070000020000001 ✔
MD5: D7EDCA0ED3749F11EE34F0F532CF5AA7 ✔
aim_spu_module.self ✔
AuthID: 1070000025000001 ✔
MD5: CA9BBC99C645173E1F98AA66C47A4500 ✔
spp_verifier.self ✔
AuthID: 1070000021000001 ✔
MD5: 90D1C8A45F6FEE52219E1B14FF8C9765 ✔
mc_iso_spu_module.self ✔
AuthID: 1070000037000001 ✔
MD5: 5FFB33A6CECB99081E54A0E36E3C61AF ✔
me_iso_spu_module.self ✔
AuthID: 1070000043000001 ✔
MD5: 3B15C14770D654FEF9987E2517616D89 ✔
sv_iso_spu_module.self ✔
AuthID: 1070000024000001 ✔
MD5: 368F2D290C00F3CB3C5A5C8CFE584534 ✔
sb_iso_spu_module.self ✔
AuthID: 107000001F000001 ✔
MD5: B39E13FBD6B07F65616A0355EF5CB262 ✔
default.spp ✔
AuthID: N/A ✔
MD5: B0AD88EE637311AE5196F1B11D43BE0A ✔
lv1.self ✔
AuthID: 1FF0000002000001 ✔
MD5: 7548E3C63CC2CABE38CDA3ED25C26F87 ✔
lv0 ✔
AuthID: 1FF0000001000001 ✔
MD5: FF6753184D15F45508C5330A6144A4D9 ✔
lv2_kernel.self ✔
AuthID: 1050000003000001 ✔
[DANGER]- BF1A41687CCE6B8F47B97878DF3C38AC
eurus_fw.bin ✔
AuthID: N/A ✔
[DANGER]- 53129848E74AFB20E2B7CEFF309BB00F
emer_init.self ✔
[DANGER] - 10700003F4000001
[DANGER]- 4657E7A64A9CAB8A9B30168AE194B5D3
ROS1:
Header Filler - ✔
Length of Flash Region - [DANGER] - 6FF7E0
Unknown Static - ✔
Entry Count - 19 ✔
Length of Flash Region 2 - [DANGER] - 6FF7E0
ROS1 431.000 File Table; AuthID & MD5:
creserved_0 ✔
AuthID: N/A ✔
[DANGER]- 1D2A894EC79AE92F16CAA49BFD92898A
[WARNING] -
[DANGER] - 0000000000000000
MD5: 737FB2CA5BA8D4F9A57C4FC1F1687F12 ✔
[WARNING] -
AuthID: 1070000022000001 ✔
[DANGER]- 62687FAB230E8F11F99D7ACCB22F7696
[WARNING] -
AuthID: 1070000023000001 ✔
[DANGER]- 92FD0828BDC6BEF8FF817396DD3D8F0B
[WARNING] -
[DANGER] - 401DE23FD00B275B
[DANGER]- 4496F724D816AE7392EA8D3D9CA0D212
[WARNING] -
[DANGER] - 10D3922D44A4941F
[DANGER]- B8FE0783677593B2A1090F931C235B56
[WARNING] -
[DANGER] - 07925634E3ADC551
[DANGER]- 3D85DA6B5F9EF3CE7E529F0AB26288BA
[WARNING] -
AuthID: 1070000021000001 ✔
[DANGER]- 6C83676B2AE255954EF9B5C55E693AEE
[WARNING] -
[DANGER] - 6100B0BE948FA447
[DANGER]- 9606C648A9918BCD7B61D61115E31CE4
[WARNING] -
[DANGER] - A065D08D900113FD
[DANGER]- 0999D77314A2A7B987E1FD83A5FD8171
[WARNING] -
AuthID: 1070000024000001 ✔
[DANGER]- 3EA2ACA42B85588E3E6EFEC35F348996
[WARNING] -
[DANGER] - 016FA3D4471836C1
[DANGER]- BC8194402DC2C0D54814C1A68B6F018F
[WARNING] -
[DANGER] - 5096A2E4344346A1
[DANGER]- 06B44A616CCA8698CEEC836F22D0F544
[WARNING] -
[DANGER] - 1070000051000001
[DANGER]- E937123065F1FE4D0DD0E354EB1FBA6F
default.spp ✔
AuthID: N/A ✔
[DANGER]- B9A7065C6E1AD616A4DD5D46F22F3D6F
[WARNING] -
[DANGER] - 17F0000002000001
[DANGER]- 2CED9E26972908E1C27070C8806014A4
[WARNING] -
[DANGER] - 17F0000001000001
[DANGER]- CA3C9490888945672A24C03B2BC6AF92
[WARNING] -
[DANGER] - 856DE286A5D8C714
[DANGER]- A2EF57DE3F1FC8521F0C508E06B5B8EE
[WARNING] -
AuthID: 1050000003000001 ✔
[DANGER]- D546D30FE8443CCD6B24DF13B076DE15
[WARNING] -
[DANGER] - 740197E5001090E5
[DANGER]- 044EA8AB7CE2C580ACC5BB2066CF431C
[WARNING] -
[DANGER] - 10700003F4000001
[DANGER]- 9A076CB1C720D7AE95CF252508C8BE3F
[WARNING] -
AuthID: 1070000501000001 ✔
[DANGER]- 0A01D4FB99729B6809B104B4D1CD2F0D
MD5 Validation:
ROS0: [DANGER] - AB96200BA0C5AD0440ED25F7524A92B2 - Patch & Recheck
ROS1: [DANGER] - 7AFEEE3C52B168B4E1BAD6C5313C9BE4 - Patch & Recheck
TRVK_PRG0: 3.41_2/3.41_DEX - B9FA9B2128677D0A0147BB1779A846AC ✔
TRVK_PRG1: 3.55/3.55_DEX - 9A3060D30A25DCE7686AA415A1857319 ✔
TRVK_PKG0: UNKNOWN - 1EFAC1E0C28112353D188A00EC92718B ✔
TRVK_PKG1: UNKNOWN - 1EFAC1E0C28112353D188A00EC92718B ✔
CVTRM 0:
Header - ✔
Filler - ✔
Filled Space -[WARNING] - Too long to display!
VTRM 0:
Header - [DANGER] - 000000005E545A4D0000000000000004
SHA1 Hash - E0602D92CAD69EC69D859BBCFF03FC18BE8EBA99 ✔
Padding - 000000E0 ✔
X & Y Tables Reserved Entries - 2569 ✔
Protected Files Table Reserved Entries - 3090 ✔
Protected Files Table Used Entries - 3 ✔
Reserved Entries - ✔
VTRM 0 Table Entries:
Table Entry 1 - [DANGER] - 0000000000000C12
Reserved Table Entry 1 - 1870000002000001 ✔
Used Table Entry 1 - [DANGER] - 1870000031000001
Self Data Validation - ✔
Table Entry 2 - [DANGER] - 0000000000000C12
Reserved Table Entry 2 - [DANGER] - 0C00000002000005
Used Table Entry 2 - [DANGER] - 18700005FF000001
Self Data Validation - ✔
Table Entry 3 - [DANGER] - 0000000000000C12
Reserved Table Entry 3 - 1870000002000001 ✔
Used Table Entry 3 - [DANGER] - 1870000003000002
Self Data Validation - ✔
VTRM 0 Continued:
Filled Area - [WARNING] - Too long to display!
Encrypted Sequence - 70B3730A16E607197470911D271F06A9979EB56A ✔
CVTRM 1:
Header - SCEI ✔
Filler - ✔
Filled Space -[WARNING] - Too long to display!
VTRM 1:
Header - VTRM ✔
SHA1 Hash - F343946A8645D221C13DE2FE303452B1B3B0262A ✔
Padding - 000000E0 ✔
X & Y Tables Reserved Entries - 521 ✔
Protected Files Table Reserved Entries - 1042 ✔
Protected Files Table Used Entries - 3 ✔
Reserved Entries - ✔
VTRM 1 Table Entries:
Table Entry 1 - ✔
Reserved Table Entry 1 - 1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
Used Table Entry 1 - [DANGER] - 1070000031000001
Self Data Validation - ✔
Table Entry 2 - ✔
Reserved Table Entry 2 - 0400000002000005 ✔
Used Table Entry 2 - [DANGER] - 10700005F7000001
Self Data Validation - ✔
Table Entry 3 - ✔
Reserved Table Entry 3 - 1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
Used Table Entry 3 - 1070000003000002 - mgvideo.self ✔
Self Data Validation - ✔
VTRM 1 Continued:
Filled Area - [WARNING] - Too long to display!
Encrypted Sequence - 70B3730A16E607197470911D271F06A9979EB56A ✔
Return
Second Region Header:
Unknown Blank - ✔
Magic Header 2 - [DANGER] - 07ACE0FF D6ADF2CE
Region Count - 03 ✔
Unknown - 02 ✔
Blank Filled Block - ✔
Second Region Unknown Block 0:
Sector Start -[DANGER] - 0000000000007100
Count - ✔
Auth ID - 1070000001000001 (SCE_CELLOS_PME) ✔
Unknown - ✔
Auth ID -1070000002000001 (PS3_LPAR) ✔
Unknown - ✔
Blank Filled Block - ✔
Second Region Unknown Block 1:
Sector Start -[DANGER] - 0000000000007200
Count - ✔
Auth ID - 1070000001000001 (SCE_CELLOS_PME) ✔
Unknown - ✔
Auth ID -1070000002000001 (PS3_LPAR) ✔
Unknown - ✔
Blank Filled Block - ✔
Blank Filled Block 2 - ✔
Filled Block - [WARNING] - Too long to display!
CELL_EXTNOR_AREA:
Header - [DANGER] - CEDLWEPTFOR_AREA
SHA1 Header - ✔
Unused Area - ✔
HD Model - @itacha@TS545016B1SA00100730PBPB0 ✔
HD Serial - 8ECB6B3W ✔
Unused Area - ✔
Hash 1 - ✔
Unused Area - ✔
Hash 2 - ✔
Unused Area - ✔
OCRL0200 - Not Found ✔
Unused Area - ✔
Filled Area - ✔
Hash 1 - ✔
Unused Area - ✔
Hash 2 - ✔
Unused Area - ✔
OCRL0200 - Not Found ✔
Unused Area - ✔
Filled Area -[WARNING] - Too long to display!
Return
Lv0ldr/Bootldr:
Encrypted Binary Size - [DANGER] - 274B
Decrypted Binary Size - [DANGER] - 274B
Calculated Bootldr Size - [DANGER] - 274F0
Rev Key - [DANGER] - C39E152420B447D2F13FB443
PerConsole Nonce - 765853F73135661AC1D8054F ✔
Filled Area[WARNING] - Too long to display!
Lv0ldr/Bootldr Corrupt Sequence Check:
Nothing Found! ✔
Lv0ldr/Bootldr Encrypted Statistics:
Sum: 161008 - [DANGER]
Mean: 628.9375 - [DANGER]
Std Dev: 315.649228248887 - [DANGER]
Entropy: 7.81063948961776 - [DANGER]
Return
Min Version: [DANGER]
File Digest Key:
Total number of keys: Mismatch! 17 [WARNING]
Key: 627CB1808AB938E32C8C091708726A579E2586E4 ✔
Bulk AuthID Check:
Total number of .self IDs: 58 ✔
PerConsole Nonce Match:
[DANGER] - 7E585BF731356E1AC9D80D4F
7E585BF731356E1AC9D80D4F
7E585BF731356E1AC9D80D4F
7E585BF731356E1AC9D80D4F
765853F73135661AC1D8054F
16 bit Corrupt Sequence Check:
Nothing Found! ✔
8 bit Corrupt Sequence Check:
Nothing Found! ✔
Repetition Check:
Nothing Found! ✔
00 / FF / Other Statistics:
22.38% ✔
8.01% [DANGER]
0.17% ✔
Time to calculate: 96.691104 seconds.
DumpEstatistic
OFFSET: 0xF40000 --- VALUE: 0x000000010000002C664715E8309BC016656E04375425F67B229A31757222632B31DD15AA607DE3F5F7A3740B95DD333A --- CRL1 HASH
OFFSET: 0xF80000 --- VALUE: 0x000000010000002C664715E8309BC016656E04375425F67B229A31757222632B31DD15AA607DE3F5F7A3740B95DD333A --- CRL2 HASH
Standard deviation to high --- bootldr
********************************************
PS3 Dump Checker v1.0 (Build: 250)
Check started: 27/02/2014 08:49:50
********************************************
08:49:50 : Reading image into memory and checking statistics...
08:49:50 : Statistics check skipped! (nothing to check)
08:49:50 : Binary check Started!
08:49:50 : Binary check for Header Magic0 Started... Result: OK!
08:49:50 : Binary check for Header Magic1 Started... Result: OK!
08:49:50 : Binary check for Flash Format Started... Result: OK!
08:49:50 : Binary check for asecure_loader Started... Result: OK!
08:49:50 : Binary check for eEID Started... Result: OK!
08:49:50 : Binary check for cISD Started... Result: OK!
08:49:50 : Binary check for cCSD Started... Result: OK!
08:49:50 : Binary check for trvk_prg0 Started... Result: OK!
08:49:50 : Binary check for trvk_prg1 Started... Result: OK!
08:49:50 : Binary check for trvk_pkg0 Started... Result: OK!
08:49:50 : Binary check for trvk_pkg1 Started... Result: OK!
08:49:50 : Binary check for ros0 Started... Result: OK!
08:49:50 : Binary check for ros1 Started... Result: OK!
08:49:50 : Binary check for cvtrm Started... Result: OK!
08:49:50 : Binary check for metldr Header Started... Result: OK!
08:49:50 : Binary check for asecure_loader Header Started... Result: OK!
08:49:50 : Binary check for eEID Header Started... Result: OK!
08:49:50 : Binary check for cISD Header Started... Result: OK!
08:49:50 : Binary check for cCSD Header Started... Result: OK!
08:49:50 : Binary check for trvk_prg0 SCE Started... Result: OK!
08:49:50 : Binary check for trvk_prg1 SCE Started... Result: OK!
08:49:50 : Binary check for trvk_pkg0 SCE Started... Result: OK!
08:49:50 : Binary check for trvk_pkg1 SCE Started... Result: OK!
08:49:50 : Binary check for ros0 Header Started... Result: OK!
08:49:50 : Binary check for ros1 Header Started... Result: OK!
08:49:50 : Binary check for cvtrm header Started... Result: OK!
08:49:50 : Binary check for IDPS/Target_ID Started... Result: OK!
08:49:50 : Binary check for metldr0 Started... Result: OK!
08:49:50 : Binary check for metldr1 Started... Result: OK!
08:49:50 : Binary check for bootldr0 Started... Result: OK!
08:49:50 : Binary check for bootldr1 Started... Result: OK!
08:49:50 : Data check Started!
08:49:50 : Data check for PS3DumpChecker.Common+DataCheck Started... Result: OK!
08:49:50 : Data check for PS3DumpChecker.Common+DataCheck Started... Result: OK!
08:49:51 : SKU List check Started!
08:49:51 : SKU Model: CECH-25xx (JTP-001) datecode: 0C or CECH-25xx (JSD-001) datecode: 0C
08:49:51 : All checks (33 Checks) have been completed after 0 Minutes 0 Seconds and 714 Milliseconds
Tests done: 33 Check result: Pass!
Filename: bkpps3-boa.bin
MD5: 7DC47A9315DC344AC019B1400A7896C5
File Size: 16777216
Validator Version: 1.31
=======================================================================
First Region Header:
Unknown Blank - ✔
Magic Header - 0FACE0FF - DEADBEEF ✔
Region Count - 00 ✔
Unknown - 00 ✔
Blank Filled Block - ✔
Flash Format:
Format/Version - IFI '120' ✔
Filled Block - ✔
Return
Flash-Region Table:
Count - 11 ✔
Length - EFFC00 ✔
asecure_loader ✔
Size: 02E800 ✔
Location: 000400 (0x800) ✔
eEID ✔
Size: 010000 ✔
Location: 02EC00 (0x2F000) ✔
cISD ✔
Size: 000800 ✔
Location: 03EC00 (0x3F000) ✔
cCSD ✔
Size: 000800 ✔
Location: 03F400 (0x3F800) ✔
trvk_prg0 ✔
Size: 020000 ✔
Location: 03FC00 (0x40000) ✔
trvk_prg1 ✔
Size: 020000 ✔
Location: 05FC00 (0x60000) ✔
trvk_pkg0 ✔
Size: 020000 ✔
Location: 07FC00 (0x80000) ✔
trvk_pkg1 ✔
Size: 020000 ✔
Location: 09FC00 (0xA0000) ✔
ros0 ✔
Size: 700000 ✔
Location: 0BFC00 (0xC0000) ✔
ros1 ✔
Size: 700000 ✔
Location: 7BFC00 (0x7C0000) ✔
cvtrm ✔
Size: 040000 ✔
Location: EBFC00 (0xEC0000) ✔
Structure/Corruption Check - ✔
Asecure_Loader/Metldr:
File Length - 0E8E ✔
Encrypted Binary Size - E920 ✔
Decrypted Binary Size - 0E8E ✔
File Name - metldr ✔
Calculated Metldr Size - E920 ✔
Rev Key - 99873BC715F280809C302225 (CECH20xx/CECH21xx/CECH25xx (DYN-001/SUR-001/JSD/JTP-001)) ✔
PerConsole Nonce - 7E585BF731356E1AC9D80D4F ✔
Metldr Version - Metldr Old - Downgradeable ✔
Blank Filled Block - ✔
Asecure_Loader/Metldr Corrupt Sequence Check:
Nothing Found! ✔
Asecure_Loader/Metldr Encrypted Statistics:
Sum: 59680 ✔
Mean: 233.125 ✔
Std Dev: 15.3679064618317 ✔
Entropy: 7.99687778841083 Bits ✔
Encrypted Individual Data:
Entries - 06 ✔
eEID Package Length - 1DD0 ✔
Blank Filler - ✔
EID Entry Table:
EID0
Entry Point - 0070 ✔
Length - 0860 ✔
EID Number - 0 ✔
EID1
Entry Point - 08D0 ✔
Length - 02A0 ✔
EID Number - 1 ✔
EID2
Entry Point - 0B70 ✔
Length - 0730 ✔
EID Number - 2 ✔
EID3
Entry Point - 12A0 ✔
Length - 0100 ✔
EID Number - 3 ✔
EID4
Entry Point - 13A0 ✔
Length - 0030 ✔
EID Number - 4 ✔
EID5
Entry Point - 13D0 ✔
Length - 0A00 ✔
EID Number - 5 ✔
EID0:
IDPS - ✔
PerConsole Nonce - 7E585BF731356E1AC9D80D4F ✔
Static + Count - 0012000B (11) ✔
EID Data Entropy: 7.89929490000347 Bits ✔
EID1:
EID Data Entropy: 7.70455362422806 Bits ✔
EID2:
P-Block Size - 0080 ✔
S-Block Size - 0690 ✔
Padding ✔
EID Data Entropy: 7.89930137208974 Bits ✔
EID3:
Content Availiability - 00000001 ✔
Indicating/Build ID - 9E8F1B15 ✔
CKP_Management_ID - 0000000002E2F33B ✔
PerConsole Nonce - 7E585BF731356E1AC9D80D4F ✔
Unknown Static - 000100D0 ✔
EID Data Entropy: 7.02903857142766 Bits ✔
EID4:
128bit Key - 348AB743AAE4807EB01A263B055FED5C ✔
128bit Key - C39BF5D6896351CDB71202F17F78647D ✔
CMAC-OMAC1 - A2325999CD22CE7E6540480D81A076CF ✔
EID Data Entropy: 5.45996250072116 Bits ✔
EID5:
IDPS - 000000010084000B101614290FF8806D ✔
PerConsole Nonce - 7E585BF731356E1AC9D80D4F ✔
Unknown Static - 00120730 ✔
EID Data Entropy: 7.93145116468345 Bits ✔
EID Unreferenced Area:
Filled - ✔
IDPS Info:
Target ID - 84 (Retail / Kiosk USA / CEX UC2) ✔
Model - 0B (CECH25xx (JTP-001 or JSD-001)) ✔
IDPS - EID0 & EID5 ✔
Console Individual System Data:
Entries - 03 ✔
cISD Package Length - 0270 ✔
Blank Filler - ✔
cISD Entry Table:
cISD0
Entry Point - 0040 ✔
Length - 0020 ✔
cISD Number - 0 ✔
cISD1
Entry Point - 0060 ✔
Length - 0200 ✔
cISD Number - 1 ✔
cISD2
Entry Point - 0260 ✔
Length - 0010 ✔
cISD Number - 2 ✔
CISD0:
MAC Address - A8E3EEEB5E87 ✔
Unknown Static - ✔
CISD1:
IDLog Header - 7F49444C (IDL) ✔
Unknown Static -0002 ✔
Area Start - 0100 ✔
Unknown Static - 7F49 ✔
Unknown Static - 0001 ✔
ECID - 01C524018B05370E09057B4200000000 ✔
Board ID - 27456405 ✔
Kiban ID - 3J5N0191373E ✔
Unknown ID - 011101110138 ✔
CKP2 Data - 0001 ✔
Unknown Static Block - ✔
Unknown Semi Static ID - 0002001100020012 ✔
CKP Management ID - 0000000002E2F33B ✔
Unknown Data - ✔
Availiable Area - ✔
CISD2:
WLAN Channel - 07FF ✔
WLAN Filler - ✔
Unreferenced Area - ✔
CISD Unreferenced Area:
Filled - ✔
Common System Data:
Entries - 01 ✔
CCSD Package Length - 0800 ✔
Blank Filler - ✔
CCSD Entry Table:
CCSD0
Entry Point - 0020 ✔
Length - 0030 ✔
CCSD Number - 0 ✔
CCSD0:
Structure - ✔
CCSD Unreferenced Area:
Unreferenced Area - ✔
Return
TRVK_PRG0:
Filler - ✔
Data Size - 02E0 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - E0 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space - ✔
TRVK_PRG1:
Filler - ✔
Data Size - 02E0 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - E0 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space - ✔
TRVK_PKG0:
Filler - ✔
Data Size - 0260 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - 60 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space - ✔
TRVK_PKG1:
Filler - ✔
Data Size - 0260 ✔
Header - SCE ✔
Unknown - ✔
Meta Size - 60 ✔
Unknown 2 - ✔
Unknown 3 - ✔
Empty Space - ✔
Filled Space - ✔
ROS0/1 Versions:
355.000 ✔
355.000 ✔
ROS0:
Header Filler - ✔
Length of Flash Region - 6FFFE0 ✔
Unknown Static - ✔
Entry Count - 18 ✔
Length of Flash Region 2 - 6FFFE0 ✔
ROS0 355.000 File Table; AuthID & MD5:
aim_spu_module.self ✔
AuthID: 1070000025000001 ✔
MD5: CA9BBC99C645173E1F98AA66C47A4500 ✔
appldr ✔
AuthID: 1FF000000C000001 ✔
MD5: 5C7436BFFC7E8D0A8E210BD0CA83CDF2 ✔
creserved_0 ✔
AuthID: N/A ✔
MD5: 09A1D434DBD7197E7C3AF8A7C28CA38B ✔
default.spp ✔
AuthID: N/A ✔
MD5: B0AD88EE637311AE5196F1B11D43BE0A ✔
emer_init.self ✔
AuthID: 10700003FC000001 ✔
MD5: 9D670B662BE696C8460449B7EFDD803E ✔
eurus_fw.bin ✔
AuthID: N/A ✔
MD5: B5F54D9A11D1EAE71F35B5907C6B9D3A ✔
hdd_copy.self ✔
AuthID: 1070000501000001 ✔
MD5: C1DC055EF0D6082580AC066E2B0A3C38 ✔
isoldr ✔
AuthID: 1FF000000A000001 ✔
MD5: 811329ECDB677181B9FC5CC3564D9047 ✔
lv0 ✔
AuthID: 1FF0000001000001 ✔
MD5: FF6753184D15F45508C5330A6144A4D9 ✔
lv1.self ✔
AuthID: 1FF0000002000001 ✔
MD5: 128499C45F6A66D48FCC0AFAE075C188 ✔
lv1ldr ✔
AuthID: 1FF0000008000001 ✔
MD5: E9AE2A62B4CC31750D4E56C7D5FFDD6F ✔
lv2ldr ✔
AuthID: 1FF0000009000001 ✔
MD5: A597AA3D8101674856EEF83AC1D0EF28 ✔
lv2_kernel.self ✔
AuthID: 1050000003000001 ✔
MD5: BE1F3E74C85FAF93F6BE893D7EC75138 ✔
manu_info_spu_module.self ✔
AuthID: 1070000055000001 ✔
MD5: 65A3EEE4C48716674CB1C29609B5F54D ✔
mc_iso_spu_module.self ✔
AuthID: 1070000037000001 ✔
MD5: 5FFB33A6CECB99081E54A0E36E3C61AF ✔
me_iso_spu_module.self ✔
AuthID: 1070000043000001 ✔
MD5: 3B15C14770D654FEF9987E2517616D89 ✔
sb_iso_spu_module.self ✔
AuthID: 107000001F000001 ✔
MD5: B39E13FBD6B07F65616A0355EF5CB262 ✔
sc_iso.self ✔
AuthID: 1070000020000001 ✔
MD5: D7EDCA0ED3749F11EE34F0F532CF5AA7 ✔
sdk_version ✔
AuthID: N/A ✔
MD5: 3DA12E2CB472EB8193309B663D7C913A ✔
spp_verifier.self ✔
AuthID: 1070000021000001 ✔
MD5: 90D1C8A45F6FEE52219E1B14FF8C9765 ✔
spu_pkg_rvk_verifier.self ✔
AuthID: 1070000022000001 ✔
MD5: B76B7244B19032A9518787D9EC827F3C ✔
spu_token_processor.self ✔
AuthID: 1070000023000001 ✔
MD5: 22ABABCFC027F892AD2CF4E1C9FD925C ✔
ROS1:
Header Filler - ✔
Length of Flash Region - 6FFFE0 ✔
Unknown Static - ✔
Entry Count - 18 ✔
Length of Flash Region 2 - 6FFFE0 ✔
ROS1 355.000 File Table; AuthID & MD5:
aim_spu_module.self ✔
AuthID: 1070000025000001 ✔
MD5: CA9BBC99C645173E1F98AA66C47A4500 ✔
appldr ✔
AuthID: 1FF000000C000001 ✔
MD5: 5C7436BFFC7E8D0A8E210BD0CA83CDF2 ✔
creserved_0 ✔
AuthID: N/A ✔
MD5: 09A1D434DBD7197E7C3AF8A7C28CA38B ✔
default.spp ✔
AuthID: N/A ✔
MD5: B0AD88EE637311AE5196F1B11D43BE0A ✔
emer_init.self ✔
AuthID: 10700003FC000001 ✔
MD5: 9D670B662BE696C8460449B7EFDD803E ✔
eurus_fw.bin ✔
AuthID: N/A ✔
MD5: B5F54D9A11D1EAE71F35B5907C6B9D3A ✔
hdd_copy.self ✔
AuthID: 1070000501000001 ✔
MD5: C1DC055EF0D6082580AC066E2B0A3C38 ✔
isoldr ✔
AuthID: 1FF000000A000001 ✔
MD5: 811329ECDB677181B9FC5CC3564D9047 ✔
lv0 ✔
AuthID: 1FF0000001000001 ✔
MD5: FF6753184D15F45508C5330A6144A4D9 ✔
lv1.self ✔
AuthID: 1FF0000002000001 ✔
MD5: 128499C45F6A66D48FCC0AFAE075C188 ✔
lv1ldr ✔
AuthID: 1FF0000008000001 ✔
MD5: E9AE2A62B4CC31750D4E56C7D5FFDD6F ✔
lv2ldr ✔
AuthID: 1FF0000009000001 ✔
MD5: A597AA3D8101674856EEF83AC1D0EF28 ✔
lv2_kernel.self ✔
AuthID: 1050000003000001 ✔
MD5: BE1F3E74C85FAF93F6BE893D7EC75138 ✔
manu_info_spu_module.self ✔
AuthID: 1070000055000001 ✔
MD5: 65A3EEE4C48716674CB1C29609B5F54D ✔
mc_iso_spu_module.self ✔
AuthID: 1070000037000001 ✔
MD5: 5FFB33A6CECB99081E54A0E36E3C61AF ✔
me_iso_spu_module.self ✔
AuthID: 1070000043000001 ✔
MD5: 3B15C14770D654FEF9987E2517616D89 ✔
sb_iso_spu_module.self ✔
AuthID: 107000001F000001 ✔
MD5: B39E13FBD6B07F65616A0355EF5CB262 ✔
sc_iso.self ✔
AuthID: 1070000020000001 ✔
MD5: D7EDCA0ED3749F11EE34F0F532CF5AA7 ✔
sdk_version ✔
AuthID: N/A ✔
MD5: 3DA12E2CB472EB8193309B663D7C913A ✔
spp_verifier.self ✔
AuthID: 1070000021000001 ✔
MD5: 90D1C8A45F6FEE52219E1B14FF8C9765 ✔
spu_pkg_rvk_verifier.self ✔
AuthID: 1070000022000001 ✔
MD5: B76B7244B19032A9518787D9EC827F3C ✔
spu_token_processor.self ✔
AuthID: 1070000023000001 ✔
MD5: 22ABABCFC027F892AD2CF4E1C9FD925C ✔
MD5 Validation:
ROS0: 3.55_PATCHED - F162E0D72EBA0F46B7FB36E6AAB63958 ✔
ROS1: 3.55_PATCHED - F162E0D72EBA0F46B7FB36E6AAB63958 ✔
TRVK_PRG0: 3.55/3.55_DEX - 9A3060D30A25DCE7686AA415A1857319 ✔
TRVK_PRG1: 3.55/3.55_DEX - 9A3060D30A25DCE7686AA415A1857319 ✔
TRVK_PKG0: 3.55/3.55_DEX - DD4AEE95E33F19F4A183886B6AD0ADDF ✔
TRVK_PKG1: 3.55/3.55_DEX - DD4AEE95E33F19F4A183886B6AD0ADDF ✔
CVTRM 0:
Header - ✔
Filler - ✔
Filled Space - ✔
VTRM 0:
Header - VTRM ✔
SHA1 Hash - E0602D92CAD69EC69D859BBCFF03FC18BE8EBA99 ✔
Padding - 000000E0 ✔
X & Y Tables Reserved Entries - 521 ✔
Protected Files Table Reserved Entries - 1042 ✔
Protected Files Table Used Entries - 3 ✔
Reserved Entries - ✔
VTRM 0 Table Entries:
Table Entry 1 - ✔
Reserved Table Entry 1 - 1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
Used Table Entry 1 - 1070000039000001 - bdp_bdmv.self ✔
Self Data Validation - ✔
Table Entry 2 - ✔
Reserved Table Entry 2 - 0400000002000005 ✔
Used Table Entry 2 - 10700005FF000001 - vsh.self ✔
Self Data Validation - ✔
Table Entry 3 - ✔
Reserved Table Entry 3 - 1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
Used Table Entry 3 - 10700005FF000001 - vsh.self ✔
Self Data Validation - ✔
VTRM 0 Continued:
Filled Area - ✔
Encrypted Sequence - 70B3730A16E607197470911D271F06A9979EB56A ✔
CVTRM 1:
Header - SCEI ✔
Filler - ✔
Filled Space - ✔
VTRM 1:
Header - VTRM ✔
SHA1 Hash - F343946A8645D221C13DE2FE303452B1B3B0262A ✔
Padding - 000000E0 ✔
X & Y Tables Reserved Entries - 521 ✔
Protected Files Table Reserved Entries - 1042 ✔
Protected Files Table Used Entries - 3 ✔
Reserved Entries - ✔
VTRM 1 Table Entries:
Table Entry 1 - ✔
Reserved Table Entry 1 - 1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
Used Table Entry 1 - 1070000039000001 - bdp_bdmv.self ✔
Self Data Validation - ✔
Table Entry 2 - ✔
Reserved Table Entry 2 - 0400000002000005 ✔
Used Table Entry 2 - 10700005FF000001 - vsh.self ✔
Self Data Validation - ✔
Table Entry 3 - ✔
Reserved Table Entry 3 - 1070000002000001 - LPAR 2 or GameOS / PS3_LPAR ✔
Used Table Entry 3 - 10700005FF000001 - vsh.self ✔
Self Data Validation - ✔
VTRM 1 Continued:
Filled Area - ✔
Encrypted Sequence - 70B3730A16E607197470911D271F06A9979EB56A ✔
Return
Second Region Header:
Unknown Blank - ✔
Magic Header 2 - 0FACE0FF - DEADFACE ✔
Region Count - 03 ✔
Unknown - 02 ✔
Blank Filled Block - ✔
Second Region Unknown Block 0:
Sector Start - ✔
Count - ✔
Auth ID - 1070000001000001 (SCE_CELLOS_PME) ✔
Unknown - ✔
Auth ID -1070000002000001 (PS3_LPAR) ✔
Unknown - ✔
Blank Filled Block - ✔
Second Region Unknown Block 1:
Sector Start - ✔
Count - ✔
Auth ID - 1070000001000001 (SCE_CELLOS_PME) ✔
Unknown - ✔
Auth ID -1070000002000001 (PS3_LPAR) ✔
Unknown - ✔
Blank Filled Block - ✔
Blank Filled Block 2 - ✔
Filled Block - ✔
CELL_EXTNOR_AREA:
Header - CELL_EXTNOR_AREA ✔
SHA1 Header - ✔
Unused Area - ✔
HD Model - @itacha@TS545016B1SA00100730PBPB0 ✔
HD Serial - 8ECB6B3W ✔
Unused Area - ✔
Hash 1 - ✔
Unused Area - ✔
Hash 2 - ✔
Unused Area - ✔
OCRL0200 - Not Found ✔
Unused Area - ✔
Filled Area - ✔
Hash 1 - ✔
Unused Area - ✔
Hash 2 - ✔
Unused Area - ✔
OCRL0200 - Not Found ✔
Unused Area - ✔
Filled Area - ✔
Return
Lv0ldr/Bootldr:
Encrypted Binary Size - 2F4B ✔
Decrypted Binary Size - 2F4B ✔
Calculated Bootldr Size - 2F4F0 ✔
Rev Key - CB9E152428B44FD2F93FBC43 (CECH25xx (JSD/JTP-001)) ✔
PerConsole Nonce - 7E585BF731356E1AC9D80D4F ✔
Filled Area ✔
Lv0ldr/Bootldr Corrupt Sequence Check:
Nothing Found! ✔
Lv0ldr/Bootldr Encrypted Statistics:
Sum: 193776 ✔
Mean: 756.9375 ✔
Std Dev: 379.437586900588 - [DANGER]
Entropy: 7.81111984527902 - [DANGER]
Return
Min Version:
3.40 ✔
File Digest Key:
Total number of keys: 40 ✔
Key: 627CB1808AB938E32C8C091708726A579E2586E4 ✔
Bulk AuthID Check:
Total number of .self IDs: 64 ✔
PerConsole Nonce Match:
Metldr, EID0, EID3, EID5 & Bootldr ✔
16 bit Corrupt Sequence Check:
Nothing Found! ✔
8 bit Corrupt Sequence Check:
Nothing Found! ✔
Repetition Check:
Nothing Found! ✔
00 / FF / Other Statistics:
26.33% ✔
10.42% ✔
0.24% ✔
Time to calculate: 119.466451 seconds.
Return
fox_el_negro escribió:Psmaniaco escribió:D4rk852 escribió:Hola a todos, tengo una duda, ya pude extraer el dump sin problemas hice las comprobaciones tal cuál como explican acá, pero quise ir un poco más allá y me doy cuenta con el HxD que el porcentaje de la nor debe de estar entre 18.38% - 29.01% y la mía marca 18.23% he sacado varias copias y todas igual con el clip, tengo pensado en soldar que me parece más seguro extraer el dump por ahí.
Si extraes la NOR con el clip retiralo y vuelve a colocarlo (asegurandote de que este bien metido) y extrae de nuevo; compara los anteriores extraidos con los nuevos a ver si tienen diferencias.
Un saludo.
estoy usando el rogero patcher! y parece fiable en su comprobacion!!
no se k opinen?
firulilla escribió:Hola,he sacado el backup de una CECH-20xx (DYN-001) la compruebo por el hexadecimal y flowrebulder yno me da ningun error.le paso el PS3 Flash Tool v4.55,la tengo en OFW 4.55 y me sale esto
********************************************
PS3 Dump Checker v1.0 (Build: 305)
Check started: 03/04/2014 14:49:43
********************************************
14:49:43 : Reading image into memory and checking statistics...
14:49:43 : Statistics check skipped! (nothing to check)
14:49:43 : Binary check Started!
14:49:43 : Binary check for Header Magic0 Started... Result: OK!
14:49:43 : Binary check for Header Magic1 Started... Result: OK!
14:49:43 : Binary check for Flash Format Started... Result: OK!
14:49:43 : Binary check for asecure_loader Started... Result: OK!
14:49:43 : Binary check for eEID Started... Result: OK!
14:49:43 : Binary check for cISD Started... Result: OK!
14:49:43 : Binary check for cCSD Started... Result: OK!
14:49:43 : Binary check for trvk_prg0 Started... Result: OK!
14:49:43 : Binary check for trvk_prg1 Started... Result: OK!
14:49:43 : Binary check for trvk_pkg0 Started... Result: OK!
14:49:43 : Binary check for trvk_pkg1 Started... Result: OK!
14:49:43 : Binary check for ros0 Started... Result: OK!
14:49:43 : Binary check for ros1 Started... Result: OK!
14:49:43 : Binary check for cvtrm Started... Result: OK!
14:49:43 : Binary check for asecure_loader Header Started... Result: OK!
14:49:43 : Binary check for eEID Header Started... Result: OK!
14:49:43 : Binary check for cISD Header Started... Result: OK!
14:49:43 : Binary check for cCSD Header Started... Result: OK!
14:49:43 : Binary check for trvk_prg0 SCE Started... Result: OK!
14:49:43 : Binary check for trvk_prg1 SCE Started... Result: OK!
14:49:43 : Binary check for trvk_pkg0 SCE Started... Result: OK!
14:49:43 : Binary check for trvk_pkg1 SCE Started... Result: OK!
14:49:43 : Binary check for ros0 Header Started... Result: OK!
14:49:43 : Binary check for ros1 Header Started... Result: OK!
14:49:43 : Binary check for metldr Header Started... Result: OK!
14:49:43 : Binary check for cvtrm header Started... Result: OK!
14:49:43 : Binary check for IDPS/Target_ID Started... Result: OK!
14:49:43 : Binary check for metldr0 Started... Result: OK!
14:49:43 : Binary check for metldr1 Started... Result: OK!
14:49:43 : Binary check for bootldr0 Started... Result: OK!
14:49:43 : Binary check for bootldr1 Started... Result: OK!
14:49:43 : Data check Started!
14:49:43 : Data Statistics check for metldr Started... Result: OK!
14:49:43 : Data Statistics check for bootldr Started... Result: OK!
14:49:43 : SKU List check Started!
14:49:43 : SKU Model: CECH-20xx (DYN-001)
14:49:43 : Hash check Started!
14:49:43 : Hash check for TRVK_PRG0 Hash Started... Result: OK!
14:49:43 : Hash check for TRVK_PRG1 Hash Started... Result: OK!
14:49:43 : Hash check for TRVK_PKG0 Hash Started... Result: OK!
14:49:43 : Hash check for TRVK_PKG1 Hash Started... Result: OK!
14:49:43 : Hash check for ROS0 Hash Started... Result: FAILED!
Actual data: MD5 Hash: 8845D70EAB7B28BB829C378A37121DDF
14:49:43 : Hash check for ROS1 Hash Started... Result: FAILED!
Actual data: MD5 Hash: 8845D70EAB7B28BB829C378A37121DDF
14:49:44 : All checks (39 Checks) have been completed after 0 Minutes 0 Seconds and 661 Milliseconds
Bad count: 2 of 39 Tests Check result: Failed!
si la hago con el PS3 Flash Tool v1.00 no me da error ,alguien me puede comprobar el dump,para no arriesgarme y si allguien me lo puede parchear?
muchas gracias
1 saludol
sven_h escribió:Hola,vereis despues de un año sin usar el e3 flasher,lo use para hacer mi consola,lo he vuelto a sacar para hacer la de un amigo,la otra vez no tuve problema ninguno,pero ahora,he hecho el update correcto,pero a la hora del dumpeo,me salta el siguiente error:
1 0 0 0 1 1 0 0 Error al inicializar el BIOS PS3
La ps3 es una fat de 80 gb,CECHL.
He limpiado los contactos de la nor y del e3 con alcohol,he probado teniendo presionado el clip del e3 con los dedos,y nada sigue saltando el dichoso error...
Alguien puede saber a que es debido??Decir que la otra vez segui este tutorial y todo fue perfecto.
Un saludo y gracias.
jopo01 escribió:Estoy pensando en comprar el e3 con el clip y me surgen varias dudas despues de leer durante 2-3 horas
Duda 1
Lo de dumpear 5-6 veces lo entiendo Pero hay que desmontar y recolocar el clip cada vez para estar mas seguros??
Duda 2
Y luego cada dump extraido de esos 5-6 hay que verificarlo con los tres metodos?? Checker V1.0.exe, el Flow y el hxd??
Duda 3
Supongo que seran iguales y validos si los compruebo con el hxd. Ya que con el Checker y el Flow solo me dicen si son validos. Si me dan que son validos pero los veo distintos con hxd, cual es el bueno??
Gracias de antemano. No quiero cagarla con la primera que haga. jajjajja
Psmaniaco escribió:sven_h escribió:Hola,vereis despues de un año sin usar el e3 flasher,lo use para hacer mi consola,lo he vuelto a sacar para hacer la de un amigo,la otra vez no tuve problema ninguno,pero ahora,he hecho el update correcto,pero a la hora del dumpeo,me salta el siguiente error:
1 0 0 0 1 1 0 0 Error al inicializar el BIOS PS3
La ps3 es una fat de 80 gb,CECHL.
He limpiado los contactos de la nor y del e3 con alcohol,he probado teniendo presionado el clip del e3 con los dedos,y nada sigue saltando el dichoso error...
Alguien puede saber a que es debido??Decir que la otra vez segui este tutorial y todo fue perfecto.
Un saludo y gracias.Psmaniaco escribió:Eso es por el clip, no esta bien asentado.
sven_h escribió:Psmaniaco escribió:sven_h escribió:Hola,vereis despues de un año sin usar el e3 flasher,lo use para hacer mi consola,lo he vuelto a sacar para hacer la de un amigo,la otra vez no tuve problema ninguno,pero ahora,he hecho el update correcto,pero a la hora del dumpeo,me salta el siguiente error:
1 0 0 0 1 1 0 0 Error al inicializar el BIOS PS3
La ps3 es una fat de 80 gb,CECHL.
He limpiado los contactos de la nor y del e3 con alcohol,he probado teniendo presionado el clip del e3 con los dedos,y nada sigue saltando el dichoso error...
Alguien puede saber a que es debido??Decir que la otra vez segui este tutorial y todo fue perfecto.
Un saludo y gracias.Psmaniaco escribió:Eso es por el clip, no esta bien asentado.
Gracias Psmaniaco,he probado de todas las formas y no hay manera...voy a optar por soldar el e3linker,me surge una duda,en el e3linker hay 5 puntos GND,sin embargo la placa de la ps3 a la que tengo que soldar solo tiene 4,he leido por ahi...que solo es necesario soldar dos puntos GND,esto es cierto??o debo soldar los 5 puntos??si es asi,como tengo 4,puedo soldar dos juntos??
Un saludo y gracias de nuevo.
DIA-001 + DIA-002 BOARD
VER-001 BOARD
JSD-001 & SUR-001
DYN-001
Psmaniaco escribió:Si ya teneis soldados los aseguraos solo de una cosa, que no sean demasiado largos para evitar interferencias electricas, ya que os puede dar un dump corrupto o malo, aunque el clip sea una mierda si se consigue asentarlo bien por lo general suele dar los dumps correctos (aunque es un riesgo usarlo), en el E3 Linker hay que soldar unos 48 cables y si alguno tiene la soldadura fria os daran dumps erroneos todo el rato, asi comprobad eso minuciosamente.
Un saludo.
Psmaniaco escribió:Si ya teneis soldados los aseguraos solo de una cosa, que no sean demasiado largos para evitar interferencias electricas, ya que os puede dar un dump corrupto o malo, aunque el clip sea una mierda si se consigue asentarlo bien por lo general suele dar los dumps correctos (aunque es un riesgo usarlo), en el E3 Linker hay que soldar unos 48 cables y si alguno tiene la soldadura fria os daran dumps erroneos todo el rato, asi comprobad eso minuciosamente.
Un saludo.
sven_h escribió:A ver si alguien me puede ayudar con elproblema que tengo:
Parcheo el dump,me crea el archivo bkpps3.bin.Rev.bak(archivo bak),este lo cojo con el flow rebuilder y pongo la opcion byte reverse and extract a Nor dump file, y me crea el archivo bkpps3.bin.REV.bak.REV.EXT,pero es que este archivo me lo marca como "volumen rar de recuperacion",y aunque lo renombre y lo deje como bkpps3.bin,sigue siendo un volumen rar de recuperacion,por lo tanto la consola no me lo coge.
Se que estoy haciendo algo mal,pero no se el que,a ver si alguien me echa una mano.
Un saludo y gracias.
Edito he mirado la tarjeta sd y efectivamente me crea un archivo de texto que me pone lo siguiente:
start logging...
program PS3 BIOS.
program from TF.
fail to open 0:bkpps3.bin.
Edito 2: ya esta solucionado,gracias a Psmaniaco,el problema era que windows no me dejaba cambiar la extension de los archivos,asi es que he ido a opciones de carpeta y he deshabilitado esa opcion,y ya he podido cambiar la extension del archivo a .bin
Un saludo y gracias Psmaniaco por tu ayuda.
LUCKYMAS escribió:El problema ya no es el e3 solo ,es desmontarla. Disipadores rsx cell ,componetes se sueltan ,etc.
sven_h escribió:Buenas,despues de recuperar de un brick la ps3 siguiendo el tuto de ps3 unbrick,metiendole el dump parcheado con los tres mosqueteros,ahora la consola arranca correctamente,puedo navegar por el menu,pero con un cartel rojo que pone playstation 3 factory/service mode,decir que la consola estaba en ofw 4.46,que cuando intento entrar en modo recovery,haciendo la combinacion de botones,parece que va a arrancar el modo service factory,pero la consola se apaga.
Alguna ayuda para dar luz a esto,alguien sabe que puedo hacer??
Un saludo y gracias.
ERMaCDR escribió:sven_h escribió:Buenas,despues de recuperar de un brick la ps3 siguiendo el tuto de ps3 unbrick,metiendole el dump parcheado con los tres mosqueteros,ahora la consola arranca correctamente,puedo navegar por el menu,pero con un cartel rojo que pone playstation 3 factory/service mode,decir que la consola estaba en ofw 4.46,que cuando intento entrar en modo recovery,haciendo la combinacion de botones,parece que va a arrancar el modo service factory,pero la consola se apaga.
Alguna ayuda para dar luz a esto,alguien sabe que puedo hacer??
Un saludo y gracias.
Lo solucionas con el Lv2diag.self que sirve para salir del modo servicio:
Copia el archivo en la raíz de un pendrive en fat32 y lo conectas al puerto USB más cercano al lector. Enciende la consola, hace unos pitidos y se apaga inmediatamente. Luego desconectas el pendrive, enciende y listo.
Saludos
sven_h escribió:No,todo eso ya lo he probado,no hace nada,tambien he intentado,metiendo en el pen el lv2diagself(paso 1) con el ps3updat.pup,y tampoco hace nada,he probado con el dongle para meterla en factory service y nada de nada,no hay manera.
Se supone que si he parcheado con los 3 mosqueteros el dump,deberia entrar en factory service y ya desde ahi instalar el cfw,pero no puedo entrar,haga lo que haga,la consola se apaga cuando lo intento.La consola sigue marcando fimrware 4.46.
Gracias por tu ayuda,a ver si a alguien se le ocurre algo mas...
Un saludo.
ERMaCDR escribió:sven_h escribió:No,todo eso ya lo he probado,no hace nada,tambien he intentado,metiendo en el pen el lv2diagself(paso 1) con el ps3updat.pup,y tampoco hace nada,he probado con el dongle para meterla en factory service y nada de nada,no hay manera.
Se supone que si he parcheado con los 3 mosqueteros el dump,deberia entrar en factory service y ya desde ahi instalar el cfw,pero no puedo entrar,haga lo que haga,la consola se apaga cuando lo intento.La consola sigue marcando fimrware 4.46.
Gracias por tu ayuda,a ver si a alguien se le ocurre algo mas...
Un saludo.
Si aplicaste los parches de los 3 mosqueteros no había necesidad de entrar en modo servicio, simplemente era aplicar los parches a tu backup de la nor, flashearlo en tu consola y luego instalar un CFW 4.xx directamente. Ahora lo que pasa es que tienes instalado el OFW 4.46 (el que tenías antes de comenzar el proceso) parcheado, pero en modo servicio, por eso te sale el cartel rojo. Como aclaratoria, el modo servicio sólo era necesario si aplicabas los parches para hacer downgrade a 3.55
Yo no soy muy especialista en estos temas, pero puedes tratar en instalar el CFW 4.xx directamente desde el XMB y luego tratar de sacarla del modo servicio con el archivo Lv2diag.self del paso 2.
Saludos
LUCKYMAS escribió:Eso pasa por hacer las cosas sin leer ni tener idea de lo que haces , si le metes el dongle y se apadaga sin pitar es por que la has metido en factoty modo mientras le metas en un pen el self1 jaicrack y pup cfw no chek no instalaras nada , luego cuando se apague otra vez hay que meter self 2 para sacarla de factory modo . ahora mismo la tienes en factory modo mientras no la saques de hay el flasher no te sirve para nada . ahora solo puedes con el flasher meter el v2 de dospiedras y meter el donle otra vez si no se queda asi de por vida.
LUCKYMAS escribió:necesitas sacar dump nuevamente el anterior ya no te vale , y parchear este a mano, a mano , a mano que quede claro. con el v2 formatea el hdd en el pc.