(2009年4月29日)直播內容 (直播告一段落)(HEN視頻放出)
以下來自mfm論壇,內容虛實玩家自行判斷
格林威治夏季標準時間2009年4月28日
HEN的演示視頻現在已經發出:
http://www.youtube.com/watch?v=Qn2Z8bYr3tE
優酷演示地址:
http://v.youku.com/v_show/id_XODc4MzQzODg=.html
土豆演示地址:
http://www.tudou.com/programs/view/YIaxkydyDZA/
視頻解釋如下:
來自mfm論壇
http://forums.mformature.net/showpost.php?p=45202&postcount=1306
Video Description
This is a demo of the 5.03 firmware running the tiff exploit and booting into
a HEN environment on a PSP 2003 on 5.03 Official Firmware. This proves that
the code survives a reboot and the system software and MAC address can be
changed. This is something that only can be done with a kernel exploit. A
video launching homebrew will be posted later.
這是一個演示視頻,在psp2003(v3主板)的5.03官方固件上,5.03固件運行了tiff漏洞而且
啟動進入了HEN環境.
這個視頻是要證明我們的代碼支持一個重啟過程,而且系統軟件和網卡mac地址能被改變.
這是唯有核心漏洞才能做到的.一個演示運行自制軟件的視頻稍後會發出.
Credits:
Homebrew Enabler - (Davee) Team Typhoon
5.03 Tiff Exploit - MaTiAz
Video - Granite
The Community - All your support.
以下繼續內容:
20:40 G0l3m what happens if you start hen and then execute the
exploit again ?
如果你啟動了HEN,然後又在執行這個漏洞,會發生什麼?
20:41 Daveee G0l3m, it'll reboot
會重起
20:42 thedicemaster doubt it's easy to run the exploit twice in
a row.
很懷疑那麼容易就能連續運行這個漏洞兩次
20:43 thedicemaster memory probably won't be as clean as the
first time you activate the exploit.
內存可能不會像第一次激活漏洞時候那麼幹淨
20:43 Daveee it'll be as clean
內存會被清空
21:22 Daveee Cannot get tiff to execute on 3k
Davee還不能讓tiff漏洞在3k上執行麼
21:22 G0l3m Daveee: any ideas why?
找到原因了麼?
21:23 Daveee G0l3m, because I'm not very lucky?
因為我不是很幸運
21:23 G0l3m so it will run, but just out of lukc?
所以這個漏洞運行了,但是就是不是很幸運
21:23 Daveee Well, thats how the tiff exploit works...
恩,這就是這個tiff漏洞的運行方式了(表明tiff漏洞在3k上不穩定)
22:07 FazerminSweden I finally got a hand on m33, they are gonna
contact me ASAP,
我(研究pre-ipl的人)和m33小組取得了聯繫,他們會盡快和我聯繫的
22:24 Cloudy FazerminSweden, did you manage to find the pre-ipl after
decapping the CPU?
FazerminSweden,你在打開cpu後嘗試找到pre-ipl了麼?
22:24 FazerminSweden We found about 75% Of the PRE-IPL? But we arent
done with the entire code..
我們找到了大概75%的pre-ipl.但是我們還沒有獲得完全的代碼
22:24 FazerminSweden Stil missing a small part,
仍然有一小部分無法得到
22:24 FazerminSweden But that wont take long to get,
但是不會花很長時間去獲得(剩餘的部分)
22:30 n00b81 Fazermin: if I may ask, Im just curious, how long have you
been working on this?
如果我問,當然我只是好奇,你在這方面(pre-ipl)工作多久了
22:30 FazerminSweden Long enough, but im not alone... Got really
awesome Study-Buddies :D
足夠久了,但是我不是一個人,有幾個很好的同伴
22:30 FazerminSweden With awesome skills..
他們都很厲害
22:44 n00b81 I fail to see why/how this scene is dying. I used
to think the same thing, but now a HEN is being developed, and the pre-IPL is
75% hacked like Fazermin said. For now, I think the scene is far from dying.
我沒有看到這個領域(psp破解領域)正在消亡.我本來認為這個領域要到頭了,但是現在HEN
正在被開發,而且pre-ipl有75%被破解了正如Fazermin說的(表示質疑,因為他沒收到任何
證據).現在,我想這個領域遠遠還沒有消亡.
--
以下來自mfm論壇,內容虛實玩家自行判斷
格林威治夏季標準時間2009年4月28日
HEN的演示視頻現在已經發出:
http://www.youtube.com/watch?v=Qn2Z8bYr3tE
http://v.youku.com/v_show/id_XODc4MzQzODg=.html
土豆演示地址:
http://www.tudou.com/programs/view/YIaxkydyDZA/
視頻解釋如下:
來自mfm論壇
http://forums.mformature.net/showpost.php?p=45202&postcount=1306
Video Description
This is a demo of the 5.03 firmware running the tiff exploit and booting into
a HEN environment on a PSP 2003 on 5.03 Official Firmware. This proves that
the code survives a reboot and the system software and MAC address can be
changed. This is something that only can be done with a kernel exploit. A
video launching homebrew will be posted later.
這是一個演示視頻,在psp2003(v3主板)的5.03官方固件上,5.03固件運行了tiff漏洞而且
啟動進入了HEN環境.
這個視頻是要證明我們的代碼支持一個重啟過程,而且系統軟件和網卡mac地址能被改變.
這是唯有核心漏洞才能做到的.一個演示運行自制軟件的視頻稍後會發出.
Credits:
Homebrew Enabler - (Davee) Team Typhoon
5.03 Tiff Exploit - MaTiAz
Video - Granite
The Community - All your support.
以下繼續內容:
20:40 G0l3m what happens if you start hen and then execute the
exploit again ?
如果你啟動了HEN,然後又在執行這個漏洞,會發生什麼?
20:41 Daveee G0l3m, it'll reboot
會重起
20:42 thedicemaster doubt it's easy to run the exploit twice in
a row.
很懷疑那麼容易就能連續運行這個漏洞兩次
20:43 thedicemaster memory probably won't be as clean as the
first time you activate the exploit.
內存可能不會像第一次激活漏洞時候那麼幹淨
20:43 Daveee it'll be as clean
內存會被清空
21:22 Daveee Cannot get tiff to execute on 3k
Davee還不能讓tiff漏洞在3k上執行麼
21:22 G0l3m Daveee: any ideas why?
找到原因了麼?
21:23 Daveee G0l3m, because I'm not very lucky?
因為我不是很幸運
21:23 G0l3m so it will run, but just out of lukc?
所以這個漏洞運行了,但是就是不是很幸運
21:23 Daveee Well, thats how the tiff exploit works...
恩,這就是這個tiff漏洞的運行方式了(表明tiff漏洞在3k上不穩定)
22:07 FazerminSweden I finally got a hand on m33, they are gonna
contact me ASAP,
我(研究pre-ipl的人)和m33小組取得了聯繫,他們會盡快和我聯繫的
22:24 Cloudy FazerminSweden, did you manage to find the pre-ipl after
decapping the CPU?
FazerminSweden,你在打開cpu後嘗試找到pre-ipl了麼?
22:24 FazerminSweden We found about 75% Of the PRE-IPL? But we arent
done with the entire code..
我們找到了大概75%的pre-ipl.但是我們還沒有獲得完全的代碼
22:24 FazerminSweden Stil missing a small part,
仍然有一小部分無法得到
22:24 FazerminSweden But that wont take long to get,
但是不會花很長時間去獲得(剩餘的部分)
22:30 n00b81 Fazermin: if I may ask, Im just curious, how long have you
been working on this?
如果我問,當然我只是好奇,你在這方面(pre-ipl)工作多久了
22:30 FazerminSweden Long enough, but im not alone... Got really
awesome Study-Buddies :D
足夠久了,但是我不是一個人,有幾個很好的同伴
22:30 FazerminSweden With awesome skills..
他們都很厲害
22:44 n00b81 I fail to see why/how this scene is dying. I used
to think the same thing, but now a HEN is being developed, and the pre-IPL is
75% hacked like Fazermin said. For now, I think the scene is far from dying.
我沒有看到這個領域(psp破解領域)正在消亡.我本來認為這個領域要到頭了,但是現在HEN
正在被開發,而且pre-ipl有75%被破解了正如Fazermin說的(表示質疑,因為他沒收到任何
證據).現在,我想這個領域遠遠還沒有消亡.
--
All Comments