Quantcast
Channel: PS3Hax Network - Playstation 3 and Playstation 4 Hacks and Mods
Viewing all articles
Browse latest Browse all 19499

PS3 XMBM+ extraced fully + reversing certain files

$
0
0
OK, so to start out I fully extracted the PS3 XMBM+ part one and two pkg files. Also in the part two file in the usdir>resource folder there are file types like .new and .ori, .341 and .3.55, the .new and .ori are already in plain text if viewed with a text editor. but the other file types were not, there is a simple way to reverse them too see everything. I only did this so people could make there own xmb type pkgs like they have simply and easily. this stuff is really the easiest of ps3 developing.


Part 1 EBOOT.BIN read
Quote:

SELF header
elf #1 offset: 00000000_00000090
header len: 00000000_00000a80
meta offset: 00000000_000004a0
phdr offset: 00000000_00000040
shdr offset: 00000000_00007200
file size: 00000000_0005ef90
auth id: 10100000_01000003 (Unknown)
vendor id: 01000002
info offset: 00000000_00000070
sinfo offset: 00000000_00000290
version offset: 00000000_00000390
control info: 00000000_000003c0 (00000000_00000100 bytes)
app version: 3.85.0
SDK type: Retail
app type: NP-DRM application

Control info
control flags:
40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
file digest:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
NPDRM info:
magic: 4e504400
unk0 : 00000001
unk1 : 00000003
unk2 : 00000001
content_id: UP0001-PKGMANAGE_00-0000000000000000
digest: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
invdigest: 81 e1 1c d7 e3 9e 4f cc 5f 10 c4 0c 06 18 3e bf
xordigest: 01 59 9c f2 2f 70 f1 61 7d 90 2e 1d 98 05 e7 8e

Section header
offset size compressed unk1 unk2 encrypte
00000000_00000a80 00000000_000050d8 [YES] 00000000 00000000 [YES]
00000000_00005b60 00000000_00000ca7 [YES] 00000000 00000000 [YES]
00000000_00006810 00000000_000003db [YES] 00000000 00000000 [YES]
00000000_00006bf0 00000000_00000666 [YES] 00000000 00000000 [YES]
00000000_00007260 00000000_00000000 [NO ] 00000000 00000000 [YES]
00000000_00007260 00000000_00000000 [NO ] 00000000 00000000 [N/A]
00000000_00007260 00000000_00000000 [NO ] 00000000 00000000 [N/A]
00000000_00007260 00000000_00000028 [NO ] 00000000 00000000 [N/A]

Encrypted Metadata
unable to decrypt metadata

ELF header
type: Executable file
machine: PowerPC64
version: 1
phdr offset: 00000000_00000040
shdr offset: 00000000_0005e950
entry: 00000000_000422e0
flags: 00000000
header size: 00000040
program header size: 00000038
program headers: 8
section header size: 00000040
section headers: 25
section header string table index: 24

Program headers
type offset vaddr paddr
memsize filesize PPU SPE RSX align
LOAD 00000000_00000000 00000000_00010000 00000000_00010000
00000000_00010420 00000000_00010420 r-x --- --- 00000000_00010000
LOAD 00000000_00020000 00000000_00030000 00000000_00030000
00000000_00013460 00000000_00013460 rw- --- --- 00000000_00010000
LOAD 00000000_00040000 00000000_10000000 00000000_10000000
00000000_00000c50 00000000_00000c50 r-- r-- --- 00000000_00010000
LOAD 00000000_00050000 00000000_10010000 00000000_10010000
00000000_0000eb40 00000000_0000e860 rw- rw- --- 00000000_00010000
LOAD 00000000_0005e860 00000000_00000000 00000000_00000000
00000000_00000000 00000000_00000000 rw- rw- rw- 00000000_00010000
????? 00000000_00030004 00000000_00040008 00000000_00040008
00000000_00000780 00000000_00000000 r-- --- --- 00000000_00000008
????? 00000000_00000000 00000000_00000000 00000000_00000000
00000000_00000000 00000000_00000000 --- --- --- 00000000_00000008
????? 00000000_000103f8 00000000_000203f8 00000000_000203f8
00000000_00000028 00000000_00000028 --- --- --- 00000000_00000001

Section headers
[Nr] Name Type Addr ES Flg Lk Inf Al
Off Size
[00] <no-name> NULL 00000000_00000000 00 00 000 00
00000000_00000000 00000000_00000000
[01] <no-name> PROGBITS 00000000_00010200 00 wa 00 000 08
00000000_00000200 00000000_00000030
[02] <no-name> PROGBITS 00000000_00010230 00 wa 00 000 08
00000000_00000230 00000000_0000ac4c
[03] <no-name> PROGBITS 00000000_0001ae80 00 wa 00 000 08
00000000_0000ae80 00000000_00000028
[04] <no-name> PROGBITS 00000000_0001aea8 00 wa 00 000 08
00000000_0000aea8 00000000_00000d00
[05] <no-name> PROGBITS 00000000_00020000 00 a 00 000 04
00000000_00010000 00000000_0000003e
[06] <no-name> PROGBITS 00000000_00020040 00 a 00 000 04
00000000_00010040 00000000_00000308
[07] <no-name> PROGBITS 00000000_00020348 00 a 00 000 04
00000000_0005e860 00000000_00000000
[08] <no-name> PROGBITS 00000000_00020348 00 ae 00 000 04
00000000_00010348 00000000_000000b0
[09] <no-name> PROGBITS 00000000_000203f8 00 a 00 000 01
00000000_000103f8 00000000_00000028
[10] <no-name> PROGBITS 00000000_00030000 00 ae 00 000 04
00000000_00020000 00000000_00000308
[11] <no-name> PROGBITS 00000000_00040000 00 a 00 000 04
00000000_00030000 00000000_00000004
[12] <no-name> NOBITS 00000000_00040008 00 ae 00 000 08
00000000_00030004 00000000_00000780
[13] <no-name> PROGBITS 00000000_00040008 00 ae 00 000 08
00000000_00030008 00000000_00000020
[14] <no-name> PROGBITS 00000000_00040028 00 ae 00 000 08
00000000_00030028 00000000_00000010
[15] <no-name> PROGBITS 00000000_00040038 00 ae 00 000 08
00000000_00030038 00000000_00000008
[16] <no-name> PROGBITS 00000000_00040040 00 ae 00 000 08
00000000_00030040 00000000_00002280
[17] <no-name> PROGBITS 00000000_000422c0 00 ae 00 000 08
00000000_000322c0 00000000_00000b80
[18] <no-name> PROGBITS 00000000_00042e40 00 ae 00 000 08
00000000_0005e860 00000000_00000000
[19] <no-name> PROGBITS 00000000_00042e40 00 ae 00 000 08
00000000_00032e40 00000000_00000620
[20] <no-name> PROGBITS 00000000_10000000 00 a 00 000 08
00000000_00040000 00000000_00000c50
[21] <no-name> PROGBITS 00000000_10010000 00 ae 00 000 08
00000000_00050000 00000000_0000e860
[22] <no-name> NOBITS 00000000_1001e860 00 ae 00 000 08
00000000_0005e860 00000000_000002e0
[23] <no-name> PROGBITS 00000000_00000000 01 00 000 01
00000000_0005e860 00000000_00000011
[24] <no-name> STRTAB 00000000_00000000 00 00 000 01
00000000_0005e871 00000000_000000da
Part 2 EBOOT.BIN read
Quote:

SELF header
elf #1 offset: 00000000_00000090
header len: 00000000_00000a80
meta offset: 00000000_000004a0
phdr offset: 00000000_00000040
shdr offset: 00000000_00007200
file size: 00000000_0005ef90
auth id: 10100000_01000003 (Unknown)
vendor id: 01000002
info offset: 00000000_00000070
sinfo offset: 00000000_00000290
version offset: 00000000_00000390
control info: 00000000_000003c0 (00000000_00000100 bytes)
app version: 3.85.0
SDK type: Retail
app type: NP-DRM application

Control info
control flags:
40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
file digest:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
NPDRM info:
magic: 4e504400
unk0 : 00000001
unk1 : 00000003
unk2 : 00000001
content_id: UP0001-PKGMANAGE_00-0000000000000000
digest: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
invdigest: 81 e1 1c d7 e3 9e 4f cc 5f 10 c4 0c 06 18 3e bf
xordigest: 01 59 9c f2 2f 70 f1 61 7d 90 2e 1d 98 05 e7 8e

Section header
offset size compressed unk1 unk2 encrypted
00000000_00000a80 00000000_000050d8 [YES] 00000000 00000000 [YES]
00000000_00005b60 00000000_00000ca7 [YES] 00000000 00000000 [YES]
00000000_00006810 00000000_000003db [YES] 00000000 00000000 [YES]
00000000_00006bf0 00000000_00000666 [YES] 00000000 00000000 [YES]
00000000_00007260 00000000_00000000 [NO ] 00000000 00000000 [YES]
00000000_00007260 00000000_00000000 [NO ] 00000000 00000000 [N/A]
00000000_00007260 00000000_00000000 [NO ] 00000000 00000000 [N/A]
00000000_00007260 00000000_00000028 [NO ] 00000000 00000000 [N/A]

Encrypted Metadata
unable to decrypt metadata

ELF header
type: Executable file
machine: PowerPC64
version: 1
phdr offset: 00000000_00000040
shdr offset: 00000000_0005e950
entry: 00000000_000422e0
flags: 00000000
header size: 00000040
program header size: 00000038
program headers: 8
section header size: 00000040
section headers: 25
section header string table index: 24

Program headers
type offset vaddr paddr
memsize filesize PPU SPE RSX align
LOAD 00000000_00000000 00000000_00010000 00000000_00010000
00000000_00010420 00000000_00010420 r-x --- --- 00000000_00010000
LOAD 00000000_00020000 00000000_00030000 00000000_00030000
00000000_00013460 00000000_00013460 rw- --- --- 00000000_00010000
LOAD 00000000_00040000 00000000_10000000 00000000_10000000
00000000_00000c50 00000000_00000c50 r-- r-- --- 00000000_00010000
LOAD 00000000_00050000 00000000_10010000 00000000_10010000
00000000_0000eb40 00000000_0000e860 rw- rw- --- 00000000_00010000
LOAD 00000000_0005e860 00000000_00000000 00000000_00000000
00000000_00000000 00000000_00000000 rw- rw- rw- 00000000_00010000
????? 00000000_00030004 00000000_00040008 00000000_00040008
00000000_00000780 00000000_00000000 r-- --- --- 00000000_00000008
????? 00000000_00000000 00000000_00000000 00000000_00000000
00000000_00000000 00000000_00000000 --- --- --- 00000000_00000008
????? 00000000_000103f8 00000000_000203f8 00000000_000203f8
00000000_00000028 00000000_00000028 --- --- --- 00000000_00000001

Section headers
[Nr] Name Type Addr ES Flg Lk Inf Al
Off Size
[00] <no-name> NULL 00000000_00000000 00 00 000 00
00000000_00000000 00000000_00000000
[01] <no-name> PROGBITS 00000000_00010200 00 wa 00 000 08
00000000_00000200 00000000_00000030
[02] <no-name> PROGBITS 00000000_00010230 00 wa 00 000 08
00000000_00000230 00000000_0000ac4c
[03] <no-name> PROGBITS 00000000_0001ae80 00 wa 00 000 08
00000000_0000ae80 00000000_00000028
[04] <no-name> PROGBITS 00000000_0001aea8 00 wa 00 000 08
00000000_0000aea8 00000000_00000d00
[05] <no-name> PROGBITS 00000000_00020000 00 a 00 000 04
00000000_00010000 00000000_0000003e
[06] <no-name> PROGBITS 00000000_00020040 00 a 00 000 04
00000000_00010040 00000000_00000308
[07] <no-name> PROGBITS 00000000_00020348 00 a 00 000 04
00000000_0005e860 00000000_00000000
[08] <no-name> PROGBITS 00000000_00020348 00 ae 00 000 04
00000000_00010348 00000000_000000b0
[09] <no-name> PROGBITS 00000000_000203f8 00 a 00 000 01
00000000_000103f8 00000000_00000028
[10] <no-name> PROGBITS 00000000_00030000 00 ae 00 000 04
00000000_00020000 00000000_00000308
[11] <no-name> PROGBITS 00000000_00040000 00 a 00 000 04
00000000_00030000 00000000_00000004
[12] <no-name> NOBITS 00000000_00040008 00 ae 00 000 08
00000000_00030004 00000000_00000780
[13] <no-name> PROGBITS 00000000_00040008 00 ae 00 000 08
00000000_00030008 00000000_00000020
[14] <no-name> PROGBITS 00000000_00040028 00 ae 00 000 08
00000000_00030028 00000000_00000010
[15] <no-name> PROGBITS 00000000_00040038 00 ae 00 000 08
00000000_00030038 00000000_00000008
[16] <no-name> PROGBITS 00000000_00040040 00 ae 00 000 08
00000000_00030040 00000000_00002280
[17] <no-name> PROGBITS 00000000_000422c0 00 ae 00 000 08
00000000_000322c0 00000000_00000b80
[18] <no-name> PROGBITS 00000000_00042e40 00 ae 00 000 08
00000000_0005e860 00000000_00000000
[19] <no-name> PROGBITS 00000000_00042e40 00 ae 00 000 08
00000000_00032e40 00000000_00000620
[20] <no-name> PROGBITS 00000000_10000000 00 a 00 000 08
00000000_00040000 00000000_00000c50
[21] <no-name> PROGBITS 00000000_10010000 00 ae 00 000 08
00000000_00050000 00000000_0000e860
[22] <no-name> NOBITS 00000000_1001e860 00 ae 00 000 08
00000000_0005e860 00000000_000002e0
[23] <no-name> PROGBITS 00000000_00000000 01 00 000 01
00000000_0005e860 00000000_00000011
[24] <no-name> STRTAB 00000000_00000000 00 00 000 01
00000000_0005e871 00000000_000000da

How to reverse the files.
Quote:

OK, this is so simple and any one could have done it if they just looked at it and knew anything about ps3. there are files named "rco.rbg.355, rco.rbg.341 and rco.ofw.355, rco.rbg.341ect;" and a couple more similar. You will notice if you look at the file there is rco involved in it. A rco file is a file found in the dev_Flash of the ps3 which could include the following system information, sounds, icons, and other theme graphics; commonly used to customize the look and feel of the PS3 xmb. We can extrrace the xml file and image text and so on out of the with rcomage, so to reverse the files they have simply rename the files and cut them down to where the file type is rco and then confirm if on the rename. Open rcomage and find the file you made a rco and dump it, congratulation you have reversed xmbm+ files.

Here is a download I uploaded to mediafire with the fully extraced pkgs I only did this so you could do your own stuff with xml if you really wanted to (don't worry it's really easy stuff not even kidding)

Download: http://www.mediafire.com/?1rn8q3ln35gy64h

Viewing all articles
Browse latest Browse all 19499

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>