THREAD: [RELEASE] SPRX Info v1.2
  1. 08-10-2015, 06:11 AM
    425
    Posts
    11,748
    Reputation
    Sep 2012
    NextGenUpdate

    Hello NGU. Today i am releasing a small application that will analyze an sprx of your choice.
    In the past i released somthing similer to this, but it had bugs and not a very good analisis.

    You must login or register to view this content.
    Features:

    Get Key Information of the file
    Scan and patch CID Stealers
    Find System Calls

    Notes:

    If you see "!Advanced CID Stealer" in the log, THIS TYPE CANNOT BE PATCHED AT THE MOMENT

    Credits:

    PS3Wiki Team
    Geo

    Update Log:

    1.0 - initial release
    v1.2 - updated with a lv2 peek check
    v1.3 - added ps3groove peek/poke
    Last edited by TheMightyMoJo ; 01-13-2017 at 05:16 AM.

  2. The Following 36 Users Say Thank You to milky4444 For This Useful Post:

    , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

  3. 08-12-2015, 12:34 PM
    28
    Posts
    722
    Reputation
    Aug 2015
    NextGenUpdate
    well, if we are just posting bypass methods for this, here is a c# one


    byte[] Byte = { 0x80, 0x00, 0x00, 0x00, 0x00, 0x40, 0x98, 0xB0 }; write this into the address 0x1006


    __asm(
    "lis %r3, 0x1006;"
    "ld %r3, 0(%r3);"
    "li %r10, 6;"
    "mr %r11, %r10;"
    "sc;");

    there is something else that you need, to make this work, but i aint saying dawg.
    why? sys_ss_get_console_id (syscall 0x366, doesn't work anymore), if you read the lv2, you can find the there, even tho this method is easy to bypass, all you need to do is, disable peek & poke, (syscalls 6 and 7)

    milky is bae.
    Last edited by sabsnothere ; 08-12-2015 at 12:38 PM.

  4. 08-12-2015, 01:55 PM
    SC58's Avatar
    SC58
    Former Staff
    SC58's Avatar
    SC58
    Former Staff
    4,467
    Posts
    119,123
    Reputation
    Sep 2012
    NextGenUpdate
    if anyone is going to do a bypass around this its not all that hard to open a prx in ida and nop or remove the function lol

    as there still going to use the same syscall unless there going to waste the time and rebuild the function the syscall calls and do it like that but don't see the happening.
  5. The Following User Thanked SC58 For This Useful Post:


  6. 08-12-2015, 01:58 PM
    28
    Posts
    722
    Reputation
    Aug 2015
    NextGenUpdate
    Originally Posted by SC58 View Post
    if anyone is going to do a bypass around this its not all that hard to open a prx in ida and nop or remove the function lol

    as there still going to use the same syscall unless there going to waste the time and rebuild the function the syscall calls and do it like that but don't see the happening.


    ahhh, but there are many ways for people to bypass the bypass, like you know, store the syscall in memory, then read it from there, and other ways. But the syscall 0x366 doesn't even work anymore, you need the read the lv2 to get it to work.
  7. 08-12-2015, 02:35 PM
    Esker's Avatar
    Esker
    Samurai Poster
    Esker's Avatar
    Esker
    Samurai Poster
    2,317
    Posts
    15,812
    Reputation
    Jul 2013
    NextGenUpdate
    can you make a version for tools?
  8. 08-12-2015, 06:54 PM
    SC58's Avatar
    SC58
    Former Staff
    SC58's Avatar
    SC58
    Former Staff
    4,467
    Posts
    119,123
    Reputation
    Sep 2012
    NextGenUpdate
    Originally Posted by sabsnothere View Post
    ahhh, but there are many ways for people to bypass the bypass, like you know, store the syscall in memory, then read it from there, and other ways. But the syscall 0x366 doesn't even work anymore, you need the read the lv2 to get it to work.


    how ever someone was to do it you can easily remove it, plus reading it from lv2 this program he made would need each cid lv2 address as its different each fw and cex/dex
  9. 08-12-2015, 07:03 PM
    28
    Posts
    722
    Reputation
    Aug 2015
    NextGenUpdate
    Originally Posted by SC58 View Post
    how ever someone was to do it you can easily remove it, plus reading it from lv2 this program he made would need each cid lv2 address as its different each fw and cex/dex


    agree
  10. 08-23-2015, 01:18 AM
    Kronos's Avatar
    Kronos
    Former Staff
    Kronos's Avatar
    Kronos
    Former Staff
    4,236
    Posts
    42,261
    Reputation
    Mar 2013
    NextGenUpdate
    Originally Posted by milky4444 View Post

    Hello NGU. Today i am releasing a small application that will analyze an sprx of your choice.
    In the past i released somthing similer to this, but it had bugs and not a very good analisis.

    You must login or register to view this content.
    Features:

    Get Key Information of the file
    Scan and patch CID Stealers
    Find System Calls

    Notes:

    If you see "!Advanced CID Stealer" in the log, THIS TYPE CANNOT BE PATCHED AT THE MOMENT

    Credits:

    PS3Wiki Team
    Geo

    Update Log:

    1.0 - initial release
    v1.2 - updated with a lv2 peek check
    v1.3 - added ps3groove peek/poke

    Download: You must login or register to view this content.
    VS: You must login or register to view this content.


    Nice. A very good idea Smile
  11. The Following User Thanked Kronos For This Useful Post:


  12. 09-16-2015, 04:40 AM
    gopro_2027's Avatar
    gopro_2027
    Vault dweller
    gopro_2027's Avatar
    gopro_2027
    Vault dweller
    578
    Posts
    21,603
    Reputation
    Oct 2014
    NextGenUpdate
    Well, crap. I'm lost. Good work milky. I still need to learn assembly Sal
  13. 09-18-2015, 12:54 AM
    Dav3s's Avatar
    Dav3s
    League Champion
    Dav3s's Avatar
    Dav3s
    League Champion
    1,560
    Posts
    5,272
    Reputation
    Jul 2014
    NextGenUpdate
    Good idea! Thanks Milky Winky Winky