News CFW e simili

NO pirateria

« Older   Newer »
 
  Share  
.
  1. jdera
        +1   -1
     
    .

    User deleted


    E' stata inviata una e-mail anonima ad un sito famoso (che non cito, sarebbe spam) in cui viene spiegato come estrarre l'lv0 della Ps3. Una volta trovato questo lv0, se tutto è vero, la Ps3 sarà stata completamente, definitivamente bucata. Sarà stato Matieulh a mandare l'e-mail? Io credo proprio di si, ma questo non ha importanza :).
    Di seguito l'e-mail:
    Hello *******, this is another anonymous leak!

    I would like to be called: anon0 to prevent confusion with all the other ‘anonymous’ members

    2 months ago, a CEX-to-DEX came out which needed the request-idps.txt

    It was all accomplished by .SIG files and ObjectiveSuites, they are encrypted files which carry out specific commands to the PS3

    We are now bringing THREE new .SIG files which can be used with 3.73 FW to carry out certain ‘tasks’
    Figure what it can do by yourself… And samples of many files can be found there which can aid in 3.73 getting hacked…
    To use ObjSuites: Put PS3 in service mode, connect PS3 to PC by ethernet cable, IP Address to 192.168.0.100

    Copy files from objcon to root of your usb drive
    Start ObjectiveSuites, then power the PS3
    All info necessary will be in the temp folder in objectivesuites…

    This is a part-of-the-equation of hacking the 3.73

    Some notes: I can guarantee something: There are many exploits present when ObjSuites connects to PS3, it forms a trusting bond… ObjSuites gets LV0/LV1 access
    Use this with care…

    Se capite un minimo di inglese avrete sicuramente capito che, se è vero, manca ormai poco al tanto sospirato CFW!
     
    Top
    .
273 replies since 3/6/2011, 09:11   4515 views
  Share  
.