naehrwert: on eEID Cryptography - 改機

Eartha avatar
By Eartha
at 2012-07-12T09:58

Table of Contents

http://nwert.wordpress.com/2012/07/11/eeid-cryptography/

When metldr is encrypted at factory, a special keyset is set in the
binary before encryption. Later when an isolated loader is loaded by
metldr, it will copy the keyset to LS offset 0x00000. It consists of
eid_root_key and eid_root_iv. To not having to use the same key for
all eEID parts, several subkeys are generated from special data called
individual information seed. These seeds are stored in the metadata
header of isolated modules loaded by isoldr. When isoldr will load a
module, it will call a subroutine that encrypts each seed chunk (0x40
bytes) using eid_root_key and eid_root_iv. Then the so-called
individual infos are passed in registers r7 to r22 (= 0x100 bytes in
total) to the loaded module where they are used further. Usually
isolated modules have a seed section of 0x100 bytes but all of them
(except sb_iso_spu_module) have all zeroes but the first 0x40 bytes
chunk. You can, for example, find the recently published EID0 seed in
the metadata section of aim_spu_module. Appliance info manager is used
to get e.g. the target ID or the PSID from EID0. This explains why the
seed can also be found in isoldr directly, since that one is checking
EID0 too.

As you can probably think, a fair amount of reversing time and
knowledge has gone into finding this, so stop calling us *swearwords*
for not releasing information that could potentially lead to more
piracy, because we think that this would do more harm to the “scene”
than just keeping some information in private (for now). Also I can
only encourage everyone that thinks about us this way or is greedy
demanding for developers/reverse engineers to release their stuff, to
fire up isoldr in IDA or disassemble it with objdump and try to
reverse all this from start to end. We’ll see, who is able to pull
this through on his own...

--

____ _ _ _ _ ____ _ _ ____ _____ ____
(_ _)( \( )( \/ )( ___)( \( )(_ _)( _ )( _ \
_)(_ ) ( \ / )__) ) ( )( )(_)( ) /
(____)(_)\_) \/ (____)(_)\_) (__) (_____)(_)\_)


--
Tags: 改機

All Comments

好像刷到壞掉了...

Isabella avatar
By Isabella
at 2012-07-10T18:09
我的機子是 PSP-3007 然後之前刷成功過的版本是6.20 pro-c 但在昨天重新弄了以後 發覺好像不小心被我改壞掉了 所以來問版上大大看要怎麼解決..... 事情如下↓ 就在昨天我興高采烈的拿起PSP來玩以後 發覺是6.20官方版本 此時不疑有他就按下了 fast recover ...

CEX-to-DEX

Necoo avatar
By Necoo
at 2012-07-09T15:14
※ 引述《cassine (Savannah)》之銘言: : http://www.ps3hax.net/2012/07/cex-to-dex-has-been-leaked/ : 要刷Flash ,所以建議有晶片燒錄器的人備份後再來玩。只有 Linux的人就是直 : 接改了。 : 刷成 DEX之後可以執行 ...

CEX-to-DEX

Hedwig avatar
By Hedwig
at 2012-07-09T13:35
http://www.ps3hax.net/2012/07/cex-to-dex-has-been-leaked/ 要刷Flash ,所以建議有晶片燒錄器的人備份後再來玩。只有 Linux的人就是直 接改了。 刷成 DEX之後可以執行 fself檔案,但沒辦法連線 PSN。 -- ○ ____ ...

請問多年前的改機可以讀現在的備份片嗎?

Madame avatar
By Madame
at 2012-07-07T00:23
看了最近的快打旋風X鐵拳 實在很心動 只是我的360是差不多三年前的 改機方式是and#34;硬改and#34;,好像植入了一個晶片 每次要讀取備份片的時候,需要先把主機前面的藍色LED燈給按亮,才能讀 不知道現在的備份片的製成方式,我的主機可以去讀嗎? 希望有人可以看得懂我的問題,由衷感謝。 ...

3.3J軟改與Motion Plus

Madame avatar
By Madame
at 2012-07-06T23:38
小弟因為老婆說想玩零~真紅之蝶 所以把快跟磚頭差不多的Wii拿出來整理 當初差不多在頭兩批的時候買的,後來改了不知名的晶片,韌體維持在3.3J 搞了幾天,參考了置底文與一些GOOGLE的改機包 總算可以進入USB隨身碟中的遊戲備份檔案 不過第一個畫面就告訴我少了些什麼,看起來應該是Motion Plus功能 ...