OK, so to start out I fully extracted the PS3 XMBM+ part one and two pkg files. Also in the part two file in the usdir>resource folder there are file types like .new and .ori, .341 and .3.55, the .new and .ori are already in plain text if viewed with a text editor. but the other file types were not, there is a simple way to reverse them too see everything. I only did this so people could make there own xmb type pkgs like they have simply and easily. this stuff is really the easiest of ps3 developing.
Part 1 EBOOT.BIN read
Part 2 EBOOT.BIN read
How to reverse the files.
Here is a download I uploaded to mediafire with the fully extraced pkgs I only did this so you could do your own stuff with xml if you really wanted to (don't worry it's really easy stuff not even kidding)
Download: http://www.mediafire.com/?1rn8q3ln35gy64h
Part 1 EBOOT.BIN read
Quote:
SELF header elf #1 offset: 00000000_00000090 header len: 00000000_00000a80 meta offset: 00000000_000004a0 phdr offset: 00000000_00000040 shdr offset: 00000000_00007200 file size: 00000000_0005ef90 auth id: 10100000_01000003 (Unknown) vendor id: 01000002 info offset: 00000000_00000070 sinfo offset: 00000000_00000290 version offset: 00000000_00000390 control info: 00000000_000003c0 (00000000_00000100 bytes) app version: 3.85.0 SDK type: Retail app type: NP-DRM application Control info control flags: 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 file digest: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 NPDRM info: magic: 4e504400 unk0 : 00000001 unk1 : 00000003 unk2 : 00000001 content_id: UP0001-PKGMANAGE_00-0000000000000000 digest: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 invdigest: 81 e1 1c d7 e3 9e 4f cc 5f 10 c4 0c 06 18 3e bf xordigest: 01 59 9c f2 2f 70 f1 61 7d 90 2e 1d 98 05 e7 8e Section header offset size compressed unk1 unk2 encrypte 00000000_00000a80 00000000_000050d8 [YES] 00000000 00000000 [YES] 00000000_00005b60 00000000_00000ca7 [YES] 00000000 00000000 [YES] 00000000_00006810 00000000_000003db [YES] 00000000 00000000 [YES] 00000000_00006bf0 00000000_00000666 [YES] 00000000 00000000 [YES] 00000000_00007260 00000000_00000000 [NO ] 00000000 00000000 [YES] 00000000_00007260 00000000_00000000 [NO ] 00000000 00000000 [N/A] 00000000_00007260 00000000_00000000 [NO ] 00000000 00000000 [N/A] 00000000_00007260 00000000_00000028 [NO ] 00000000 00000000 [N/A] Encrypted Metadata unable to decrypt metadata ELF header type: Executable file machine: PowerPC64 version: 1 phdr offset: 00000000_00000040 shdr offset: 00000000_0005e950 entry: 00000000_000422e0 flags: 00000000 header size: 00000040 program header size: 00000038 program headers: 8 section header size: 00000040 section headers: 25 section header string table index: 24 Program headers type offset vaddr paddr memsize filesize PPU SPE RSX align LOAD 00000000_00000000 00000000_00010000 00000000_00010000 00000000_00010420 00000000_00010420 r-x --- --- 00000000_00010000 LOAD 00000000_00020000 00000000_00030000 00000000_00030000 00000000_00013460 00000000_00013460 rw- --- --- 00000000_00010000 LOAD 00000000_00040000 00000000_10000000 00000000_10000000 00000000_00000c50 00000000_00000c50 r-- r-- --- 00000000_00010000 LOAD 00000000_00050000 00000000_10010000 00000000_10010000 00000000_0000eb40 00000000_0000e860 rw- rw- --- 00000000_00010000 LOAD 00000000_0005e860 00000000_00000000 00000000_00000000 00000000_00000000 00000000_00000000 rw- rw- rw- 00000000_00010000 ????? 00000000_00030004 00000000_00040008 00000000_00040008 00000000_00000780 00000000_00000000 r-- --- --- 00000000_00000008 ????? 00000000_00000000 00000000_00000000 00000000_00000000 00000000_00000000 00000000_00000000 --- --- --- 00000000_00000008 ????? 00000000_000103f8 00000000_000203f8 00000000_000203f8 00000000_00000028 00000000_00000028 --- --- --- 00000000_00000001 Section headers [Nr] Name Type Addr ES Flg Lk Inf Al Off Size [00] <no-name> NULL 00000000_00000000 00 00 000 00 00000000_00000000 00000000_00000000 [01] <no-name> PROGBITS 00000000_00010200 00 wa 00 000 08 00000000_00000200 00000000_00000030 [02] <no-name> PROGBITS 00000000_00010230 00 wa 00 000 08 00000000_00000230 00000000_0000ac4c [03] <no-name> PROGBITS 00000000_0001ae80 00 wa 00 000 08 00000000_0000ae80 00000000_00000028 [04] <no-name> PROGBITS 00000000_0001aea8 00 wa 00 000 08 00000000_0000aea8 00000000_00000d00 [05] <no-name> PROGBITS 00000000_00020000 00 a 00 000 04 00000000_00010000 00000000_0000003e [06] <no-name> PROGBITS 00000000_00020040 00 a 00 000 04 00000000_00010040 00000000_00000308 [07] <no-name> PROGBITS 00000000_00020348 00 a 00 000 04 00000000_0005e860 00000000_00000000 [08] <no-name> PROGBITS 00000000_00020348 00 ae 00 000 04 00000000_00010348 00000000_000000b0 [09] <no-name> PROGBITS 00000000_000203f8 00 a 00 000 01 00000000_000103f8 00000000_00000028 [10] <no-name> PROGBITS 00000000_00030000 00 ae 00 000 04 00000000_00020000 00000000_00000308 [11] <no-name> PROGBITS 00000000_00040000 00 a 00 000 04 00000000_00030000 00000000_00000004 [12] <no-name> NOBITS 00000000_00040008 00 ae 00 000 08 00000000_00030004 00000000_00000780 [13] <no-name> PROGBITS 00000000_00040008 00 ae 00 000 08 00000000_00030008 00000000_00000020 [14] <no-name> PROGBITS 00000000_00040028 00 ae 00 000 08 00000000_00030028 00000000_00000010 [15] <no-name> PROGBITS 00000000_00040038 00 ae 00 000 08 00000000_00030038 00000000_00000008 [16] <no-name> PROGBITS 00000000_00040040 00 ae 00 000 08 00000000_00030040 00000000_00002280 [17] <no-name> PROGBITS 00000000_000422c0 00 ae 00 000 08 00000000_000322c0 00000000_00000b80 [18] <no-name> PROGBITS 00000000_00042e40 00 ae 00 000 08 00000000_0005e860 00000000_00000000 [19] <no-name> PROGBITS 00000000_00042e40 00 ae 00 000 08 00000000_00032e40 00000000_00000620 [20] <no-name> PROGBITS 00000000_10000000 00 a 00 000 08 00000000_00040000 00000000_00000c50 [21] <no-name> PROGBITS 00000000_10010000 00 ae 00 000 08 00000000_00050000 00000000_0000e860 [22] <no-name> NOBITS 00000000_1001e860 00 ae 00 000 08 00000000_0005e860 00000000_000002e0 [23] <no-name> PROGBITS 00000000_00000000 01 00 000 01 00000000_0005e860 00000000_00000011 [24] <no-name> STRTAB 00000000_00000000 00 00 000 01 00000000_0005e871 00000000_000000da |
Quote:
SELF header elf #1 offset: 00000000_00000090 header len: 00000000_00000a80 meta offset: 00000000_000004a0 phdr offset: 00000000_00000040 shdr offset: 00000000_00007200 file size: 00000000_0005ef90 auth id: 10100000_01000003 (Unknown) vendor id: 01000002 info offset: 00000000_00000070 sinfo offset: 00000000_00000290 version offset: 00000000_00000390 control info: 00000000_000003c0 (00000000_00000100 bytes) app version: 3.85.0 SDK type: Retail app type: NP-DRM application Control info control flags: 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 file digest: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 NPDRM info: magic: 4e504400 unk0 : 00000001 unk1 : 00000003 unk2 : 00000001 content_id: UP0001-PKGMANAGE_00-0000000000000000 digest: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 invdigest: 81 e1 1c d7 e3 9e 4f cc 5f 10 c4 0c 06 18 3e bf xordigest: 01 59 9c f2 2f 70 f1 61 7d 90 2e 1d 98 05 e7 8e Section header offset size compressed unk1 unk2 encrypted 00000000_00000a80 00000000_000050d8 [YES] 00000000 00000000 [YES] 00000000_00005b60 00000000_00000ca7 [YES] 00000000 00000000 [YES] 00000000_00006810 00000000_000003db [YES] 00000000 00000000 [YES] 00000000_00006bf0 00000000_00000666 [YES] 00000000 00000000 [YES] 00000000_00007260 00000000_00000000 [NO ] 00000000 00000000 [YES] 00000000_00007260 00000000_00000000 [NO ] 00000000 00000000 [N/A] 00000000_00007260 00000000_00000000 [NO ] 00000000 00000000 [N/A] 00000000_00007260 00000000_00000028 [NO ] 00000000 00000000 [N/A] Encrypted Metadata unable to decrypt metadata ELF header type: Executable file machine: PowerPC64 version: 1 phdr offset: 00000000_00000040 shdr offset: 00000000_0005e950 entry: 00000000_000422e0 flags: 00000000 header size: 00000040 program header size: 00000038 program headers: 8 section header size: 00000040 section headers: 25 section header string table index: 24 Program headers type offset vaddr paddr memsize filesize PPU SPE RSX align LOAD 00000000_00000000 00000000_00010000 00000000_00010000 00000000_00010420 00000000_00010420 r-x --- --- 00000000_00010000 LOAD 00000000_00020000 00000000_00030000 00000000_00030000 00000000_00013460 00000000_00013460 rw- --- --- 00000000_00010000 LOAD 00000000_00040000 00000000_10000000 00000000_10000000 00000000_00000c50 00000000_00000c50 r-- r-- --- 00000000_00010000 LOAD 00000000_00050000 00000000_10010000 00000000_10010000 00000000_0000eb40 00000000_0000e860 rw- rw- --- 00000000_00010000 LOAD 00000000_0005e860 00000000_00000000 00000000_00000000 00000000_00000000 00000000_00000000 rw- rw- rw- 00000000_00010000 ????? 00000000_00030004 00000000_00040008 00000000_00040008 00000000_00000780 00000000_00000000 r-- --- --- 00000000_00000008 ????? 00000000_00000000 00000000_00000000 00000000_00000000 00000000_00000000 00000000_00000000 --- --- --- 00000000_00000008 ????? 00000000_000103f8 00000000_000203f8 00000000_000203f8 00000000_00000028 00000000_00000028 --- --- --- 00000000_00000001 Section headers [Nr] Name Type Addr ES Flg Lk Inf Al Off Size [00] <no-name> NULL 00000000_00000000 00 00 000 00 00000000_00000000 00000000_00000000 [01] <no-name> PROGBITS 00000000_00010200 00 wa 00 000 08 00000000_00000200 00000000_00000030 [02] <no-name> PROGBITS 00000000_00010230 00 wa 00 000 08 00000000_00000230 00000000_0000ac4c [03] <no-name> PROGBITS 00000000_0001ae80 00 wa 00 000 08 00000000_0000ae80 00000000_00000028 [04] <no-name> PROGBITS 00000000_0001aea8 00 wa 00 000 08 00000000_0000aea8 00000000_00000d00 [05] <no-name> PROGBITS 00000000_00020000 00 a 00 000 04 00000000_00010000 00000000_0000003e [06] <no-name> PROGBITS 00000000_00020040 00 a 00 000 04 00000000_00010040 00000000_00000308 [07] <no-name> PROGBITS 00000000_00020348 00 a 00 000 04 00000000_0005e860 00000000_00000000 [08] <no-name> PROGBITS 00000000_00020348 00 ae 00 000 04 00000000_00010348 00000000_000000b0 [09] <no-name> PROGBITS 00000000_000203f8 00 a 00 000 01 00000000_000103f8 00000000_00000028 [10] <no-name> PROGBITS 00000000_00030000 00 ae 00 000 04 00000000_00020000 00000000_00000308 [11] <no-name> PROGBITS 00000000_00040000 00 a 00 000 04 00000000_00030000 00000000_00000004 [12] <no-name> NOBITS 00000000_00040008 00 ae 00 000 08 00000000_00030004 00000000_00000780 [13] <no-name> PROGBITS 00000000_00040008 00 ae 00 000 08 00000000_00030008 00000000_00000020 [14] <no-name> PROGBITS 00000000_00040028 00 ae 00 000 08 00000000_00030028 00000000_00000010 [15] <no-name> PROGBITS 00000000_00040038 00 ae 00 000 08 00000000_00030038 00000000_00000008 [16] <no-name> PROGBITS 00000000_00040040 00 ae 00 000 08 00000000_00030040 00000000_00002280 [17] <no-name> PROGBITS 00000000_000422c0 00 ae 00 000 08 00000000_000322c0 00000000_00000b80 [18] <no-name> PROGBITS 00000000_00042e40 00 ae 00 000 08 00000000_0005e860 00000000_00000000 [19] <no-name> PROGBITS 00000000_00042e40 00 ae 00 000 08 00000000_00032e40 00000000_00000620 [20] <no-name> PROGBITS 00000000_10000000 00 a 00 000 08 00000000_00040000 00000000_00000c50 [21] <no-name> PROGBITS 00000000_10010000 00 ae 00 000 08 00000000_00050000 00000000_0000e860 [22] <no-name> NOBITS 00000000_1001e860 00 ae 00 000 08 00000000_0005e860 00000000_000002e0 [23] <no-name> PROGBITS 00000000_00000000 01 00 000 01 00000000_0005e860 00000000_00000011 [24] <no-name> STRTAB 00000000_00000000 00 00 000 01 00000000_0005e871 00000000_000000da |
How to reverse the files.
Quote:
OK, this is so simple and any one could have done it if they just looked at it and knew anything about ps3. there are files named "rco.rbg.355, rco.rbg.341 and rco.ofw.355, rco.rbg.341ect;" and a couple more similar. You will notice if you look at the file there is rco involved in it. A rco file is a file found in the dev_Flash of the ps3 which could include the following system information, sounds, icons, and other theme graphics; commonly used to customize the look and feel of the PS3 xmb. We can extrrace the xml file and image text and so on out of the with rcomage, so to reverse the files they have simply rename the files and cut them down to where the file type is rco and then confirm if on the rename. Open rcomage and find the file you made a rco and dump it, congratulation you have reversed xmbm+ files. |
Here is a download I uploaded to mediafire with the fully extraced pkgs I only did this so you could do your own stuff with xml if you really wanted to (don't worry it's really easy stuff not even kidding)
Download: http://www.mediafire.com/?1rn8q3ln35gy64h