不用破解狗可破解所有版本PS3固件的工ꠠ… - 改機

By Yedda
at 2010-12-30T22:26
at 2010-12-30T22:26
Table of Contents
小弟不才...試著把原文翻譯得更通順些...
This morning was the big unveil at the Chaos Communication Congress
in Berlin, and it did not disappoint. Here is a brief synopsis for
those that missed it.
今早在柏林的Chaos通訊會議中有了大發現,且這發現似乎是個讓人興奮的
消息。為了那些錯過這場會議的玩家們著想,以下將簡述這場會議的過程。
The first few minutes of the conference were spent explaining the
state of security on other consoles (Wii, 360, etc). Following this,
the group went on to explain the current state of affairs on the PS3.
First, explaining Geohot's memory line glitching exploit from earlier
this year. The team then went on to explain the current PS3 security
bypasses, such as jailbreaking and service mode/downgrading.
在會議的前幾分鐘主要是解釋其他遊戲主機(如Wii, XBOX360等)的保護機制。
接著,該團體開始解釋PS3目前的破解進度。首先解說的是Geohot這位少年在
今年稍早找到的記憶體線路故障漏洞。該小組接著開始解釋目前可繞過PS3
保護的方法,如越獄、服務模式或是韌體降級等等。
Approximately a half hour in, the team revealed their new PS3 secrets,
the moment we all were waiting for. One of the major highlights here
was, dongle-less jailbreaking by breaking the PS3 loaders, giving
complete control over the system. The other major feat, was calculating
the public private keys (due to botched security), giving users the
ability to sign their own SELFs Following this, the team declared
Sony's security to be EPIC FAIL!
在約半小時後,該小組發佈了他們最新發現的PS3安全性漏洞,而這也是我們大家
引頸期待的時刻。這次最重要的發現在於不需要使用USB硬體鎖來破解PS3引導器,
且同樣可取得完整的系統控制權限。另外則是藉由一段程式碼找到計算公用和私用
金鑰的方法,這方法可以讓使用者有能力簽證自行製作的程式,該小組也因此宣佈
Sony所構築起的重重保護因這段程式碼而宣告瓦解。
The recent advent of these new exploits means current firmware is
vulnerable, v3.55 and possibly beyond. It will be very difficult for
Sony to fix the described exploits.
以上所述的漏洞意味著現有的3.55版甚或是未來新版韌體都是極為脆弱且
不堪一擊的。對於Sony來說,這些將是極度難以修復的漏洞。
The team then displayed the website http://fail0verflow.com/ were we
assume will host examples of the new exploits and further details.
They stated that easy to use tools would be coming next month.
該小組利用http://fail0verflow.com/展示此次發現的漏洞與更多相關細節。
他們指出,下個月還會釋出更易於使用的工具。
--
This morning was the big unveil at the Chaos Communication Congress
in Berlin, and it did not disappoint. Here is a brief synopsis for
those that missed it.
今早在柏林的Chaos通訊會議中有了大發現,且這發現似乎是個讓人興奮的
消息。為了那些錯過這場會議的玩家們著想,以下將簡述這場會議的過程。
The first few minutes of the conference were spent explaining the
state of security on other consoles (Wii, 360, etc). Following this,
the group went on to explain the current state of affairs on the PS3.
First, explaining Geohot's memory line glitching exploit from earlier
this year. The team then went on to explain the current PS3 security
bypasses, such as jailbreaking and service mode/downgrading.
在會議的前幾分鐘主要是解釋其他遊戲主機(如Wii, XBOX360等)的保護機制。
接著,該團體開始解釋PS3目前的破解進度。首先解說的是Geohot這位少年在
今年稍早找到的記憶體線路故障漏洞。該小組接著開始解釋目前可繞過PS3
保護的方法,如越獄、服務模式或是韌體降級等等。
Approximately a half hour in, the team revealed their new PS3 secrets,
the moment we all were waiting for. One of the major highlights here
was, dongle-less jailbreaking by breaking the PS3 loaders, giving
complete control over the system. The other major feat, was calculating
the public private keys (due to botched security), giving users the
ability to sign their own SELFs Following this, the team declared
Sony's security to be EPIC FAIL!
在約半小時後,該小組發佈了他們最新發現的PS3安全性漏洞,而這也是我們大家
引頸期待的時刻。這次最重要的發現在於不需要使用USB硬體鎖來破解PS3引導器,
且同樣可取得完整的系統控制權限。另外則是藉由一段程式碼找到計算公用和私用
金鑰的方法,這方法可以讓使用者有能力簽證自行製作的程式,該小組也因此宣佈
Sony所構築起的重重保護因這段程式碼而宣告瓦解。
The recent advent of these new exploits means current firmware is
vulnerable, v3.55 and possibly beyond. It will be very difficult for
Sony to fix the described exploits.
以上所述的漏洞意味著現有的3.55版甚或是未來新版韌體都是極為脆弱且
不堪一擊的。對於Sony來說,這些將是極度難以修復的漏洞。
The team then displayed the website http://fail0verflow.com/ were we
assume will host examples of the new exploits and further details.
They stated that easy to use tools would be coming next month.
該小組利用http://fail0verflow.com/展示此次發現的漏洞與更多相關細節。
他們指出,下個月還會釋出更易於使用的工具。
--
Tags:
改機
All Comments

By Yedda
at 2011-01-02T00:17
at 2011-01-02T00:17
Related Posts
網路上iso loader不用拔卡的方式

By Lucy
at 2010-12-30T21:57
at 2010-12-30T21:57
JoySound Super DX麥克風抓不到

By Puput
at 2010-12-30T21:51
at 2010-12-30T21:51
open manger 檔名顯示不出來

By William
at 2010-12-30T13:42
at 2010-12-30T13:42
C3 研討會

By Ingrid
at 2010-12-30T13:16
at 2010-12-30T13:16
請教大家一下 我改機遇到boot.dol的問題

By Genevieve
at 2010-12-30T12:30
at 2010-12-30T12:30