<TitanMKD> Mathieulh geohot exploit is on xmb or on PUP ?
<flurix> yer we want to know please
<Mathieulh>
xmb<TitanMKD> ha fine
<Mathieulh> it is not an exploit per se
<Mathieulh>
just rco editing<zyron> i think geo changes stuff in ram - but his is not code injection
<zyron> maybe only text modification
<Mathieulh>
which he did by replacing a rco in dev_flash<TitanMKD> Mathieulh but it means he has decrypted it and launched it from linux side maybe
<Mathieulh> yes +
<Mathieulh> yes *
<fxchhat> but devèflash encrypted ?
<Mathieulh> yes it is
<TitanMKD> Mathieulh it is run from otheros ?
<Mathieulh> the code that writes the file is
<TitanMKD> Mathieulh why does it don't explain it here
<TitanMKD> Mathieulh at least to give details of what he has really done without giving source code of course
<Mathieulh> he edited a rco from the dev_flash
<TitanMKD> ok
<Mathieulh> mounted the dev_flash in linux as rw
<Mathieulh> then replaced the file
<Mathieulh> unmounted
<Mathieulh> reboot to gameos
<TitanMKD> ok fine
<zyron> ok - and the rco's are not signed?
<Mathieulh> he had to use his exploit of course
<Mathieulh> no that's the lame thing about it
<Mathieulh> that's why I suggested geohot to look into them
<Mathieulh> they are not signed or encrypted
<flurix> so ram is not cleared?
<Mathieulh> the sole security on them rely on the fact that dev_flash is originally mounted as ro
<Mathieulh> which prevents from overwritting the files
<TitanMKD> and what if the len is too long
bufferoverflow maybe
<Len> im too long?
<Mathieulh> let's just say you can do nasty things with them if you know how to
<TitanMKD> Mathieulh yes it's interesting
<zyron> but rco's are just resource files if i understand correctly.
<zyron> the bits in flash that are code are probably signed/encrypted?
<glitcher> thanks mathieulh for details.
<TitanMKD> Mathieulh i will have prefered xmb decrypted + patch and launched from otheros
<TitanMKD> Mathieulh but it's next step if one day we found the metldr com protocol ...
<Mathieulh> well it would be cleaner to decrypt lv2 with priv1 priviledges
<Mathieulh> and the loaders
<Mathieulh> and patch it
<Mathieulh> and load it
<Mathieulh> but it is harder to do
<Mathieulh> you would get full priviledges once in the gameos if you did that though
<TitanMKD> yes but that require developer working together
<TitanMKD> Mathieulh god has not done the world in 1 day
<zyron> "<@Mathieulh> [17:54:56] and they have pointers and are executed by vshmain"
<zyron> do that mean that rcos can be used as entrypoints to homebrew?
<TitanMKD> it's same for PS3 full crack
<zyron> or am i stretching it?
<TitanMKD> where are located these rco ?
<Mathieulh> in v_flash/vsh/resource
<zyron> in flash memory i think
<Mathieulh> in dev_flash/vsh/resource *
<flurix> is it only rco files?
<Mathieulh> to get them you either mount dev_flash
<Mathieulh> and grab them
<Mathieulh> or you decrypt update packages
<Mathieulh> using loaders
<Mathieulh> zyron in theory they could grant you code execution by vsh.self or one of the libsysutils sprx
<Mathieulh> which have higher priviledges than game selfs
<Mathieulh> but still not as much as the kernel itself
<Mathieulh> and certainly not as much as lv1 ones