Continuo colhendo informações por ai, infelizmente não sei programar , mas se alguém souber fazer alguma coisa com isso, mãos a obra, o site que peguei foi o mesmo do artigo anterior, ja fui verificar e não está mais lá a página ,então só posso deixar aqui o link do site . Sei que estas informações podem parecer inuteis mas para quem programa acredito que tenha algum valor:http://www.ps3news.com/
lv2 lv1 calls
tem mais uns downloads que podem ser interessantes , contendo os seguintes itens: patch431.xdelta , xdelta, mod431 , o link é:
mais artigos
esse se chama EID0 Key Seed
lv2 lv1 calls
- Spoiler:
- 1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
void add_lv2_lv1_calls()
{
lv2poke(0x800000000000171CULL, 0x7C0802A6F8010010ULL);
lv2poke(0x800000000000171CULL + 8, 0x396000B644000022ULL);
lv2poke(0x800000000000171CULL + 16,0x7C832378E8010010ULL);
lv2poke(0x800000000000171CULL + 24,0x7C0803A64E800020ULL);
lv2poke(0x800000000000171CULL + 32,0x7C0802A6F8010010ULL);
lv2poke(0x800000000000171CULL + 40,0x396000B744000022ULL);
lv2poke(0x800000000000171CULL + 48,0x38600000E8010010ULL);
lv2poke(0x800000000000171CULL + 56,0x7C0803A64E800020ULL);
lv2poke(0x800000000000171CULL + 64,0x7C0802A6F8010010ULL);
lv2poke(0x800000000000171CULL + 72,0x7D4B537844000022ULL);
lv2poke(0x800000000000171CULL + 80,0xE80100107C0803A6ULL);
lv2poke(0x800000000000171CULL + 88,0x4E80002080000000ULL);
lv2poke(0x800000000000171CULL + 96,0x0000170C80000000ULL);
lv2poke(0x800000000000171CULL + 104,0x0000171480000000ULL);
lv2poke(0x800000000000171CULL + 112,0x0000171C80000000ULL);
lv2poke(0x800000000000171CULL + 120,0x0000173C80000000ULL);
lv2poke(0x800000000000171CULL + 128,0x0000175C00000000ULL);
lv2poke(0x800000000035DC20ULL , 0x8000000000001788ULL);
lv2poke(0x800000000035DC28ULL , 0x8000000000001790ULL);
lv2poke(0x800000000035DC30ULL, 0x8000000000001798ULL);
payload con sc36
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
lv2poke(0x8000000000003D90ULL ,0x386000014E800020ULL);
lv2poke(0x8000000000003D90ULL +8,0x386000004E800020ULL);
lv2poke(0x8000000000003D90ULL +16,0x534B313000000000ULL);
lv2poke(0x8000000000003D90ULL +24,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +32,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +40,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +48,0xF821FF317C0802A6ULL);
lv2poke(0x8000000000003D90ULL +56,0xF80100E0FBE100C8ULL);
lv2poke(0x8000000000003D90ULL +64,0x38810070481ADFF9ULL);
lv2poke(0x8000000000003D90ULL +72,0x3BE000017BFFF806ULL);
lv2poke(0x8000000000003D90ULL +80,0x67FF000063FF3E60ULL);
lv2poke(0x8000000000003D90ULL +88,0xE87F00002C230000ULL);
lv2poke(0x8000000000003D90ULL +96,0x4182000C38800027ULL);
lv2poke(0x8000000000003D90ULL +104,0x480606C538800027ULL);
lv2poke(0x8000000000003D90ULL +112,0x3860080048060229ULL);
lv2poke(0x8000000000003D90ULL +120,0xF87F0000E8810070ULL);
lv2poke(0x8000000000003D90ULL +128,0x4804A8E5E8610070ULL);
lv2poke(0x8000000000003D90ULL +136,0x38800027480606A1ULL);
lv2poke(0x8000000000003D90ULL +144,0xE87F00004804A8F9ULL);
lv2poke(0x8000000000003D90ULL +152,0xE89F00007C641A14ULL);
lv2poke(0x8000000000003D90ULL +160,0xF87F000838600000ULL);
lv2poke(0x8000000000003D90ULL +168,0xEBE100C8E80100E0ULL);
lv2poke(0x8000000000003D90ULL +176,0x382100D07C0803A6ULL);
lv2poke(0x8000000000003D90ULL +184,0x4E80002000000000ULL);
lv2poke(0x8000000000003D90ULL +192,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +200,0x8000000000003DC0ULL);
lv2poke(0x8000000000003D90ULL +208,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +216,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +224,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +232,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +240,0x7C7D1B783BE00001ULL);
lv2poke(0x8000000000003D90ULL +248,0x7BFFF80667FB0000ULL);
lv2poke(0x8000000000003D90ULL +256,0x637B4110EB5B0000ULL);
lv2poke(0x8000000000003D90ULL +264,0x283A00004182004CULL);
lv2poke(0x8000000000003D90ULL +272,0x7FA3EB78E89A0000ULL);
lv2poke(0x8000000000003D90ULL +280,0x282400004182003CULL);
lv2poke(0x8000000000003D90ULL +288,0x80BA00104804A895ULL);
lv2poke(0x8000000000003D90ULL +296,0x2823000040820024ULL);
lv2poke(0x8000000000003D90ULL +304,0x80BA00107C9D2A14ULL);
lv2poke(0x8000000000003D90ULL +312,0xE87A00087C7D1B78ULL);
lv2poke(0x8000000000003D90ULL +320,0x80BA00147C632A14ULL);
lv2poke(0x8000000000003D90ULL +328,0x4804A81D4800008CULL);
lv2poke(0x8000000000003D90ULL +336,0x3B5A00184BFFFFBCULL);
lv2poke(0x8000000000003D90ULL +344,0x67E4000060843F70ULL);
lv2poke(0x8000000000003D90ULL +352,0x38A000094804A855ULL);
lv2poke(0x8000000000003D90ULL +360,0x282300004082002CULL);
lv2poke(0x8000000000003D90ULL +368,0x67FF000063FF3E60ULL);
lv2poke(0x8000000000003D90ULL +376,0xE87F000028230000ULL);
lv2poke(0x8000000000003D90ULL +384,0x41820058E87F0008ULL);
lv2poke(0x8000000000003D90ULL +392,0x389D00094804A7D9ULL);
lv2poke(0x8000000000003D90ULL +400,0xEBBF000048000044ULL);
lv2poke(0x8000000000003D90ULL +408,0x7FA3EB7867E40000ULL);
lv2poke(0x8000000000003D90ULL +416,0x60843F7A38A00009ULL);
lv2poke(0x8000000000003D90ULL +424,0x4804A81128230000ULL);
lv2poke(0x8000000000003D90ULL +432,0x4082002867FF0000ULL);
lv2poke(0x8000000000003D90ULL +440,0x63FF3E60E87F0000ULL);
lv2poke(0x8000000000003D90ULL +448,0x2823000041820014ULL);
lv2poke(0x8000000000003D90ULL +456,0xE87F0008389D0009ULL);
lv2poke(0x8000000000003D90ULL +464,0x4804A795EBBF0000ULL);
lv2poke(0x8000000000003D90ULL +472,0x7FA3EB78482BFD9CULL);
lv2poke(0x8000000000003D90ULL +480,0x2F6465765F626476ULL);
lv2poke(0x8000000000003D90ULL +488,0x64002F6170705F68ULL);
lv2poke(0x8000000000003D90ULL +496,0x6F6D650000000000ULL);
lv2poke(0x8000000000003D90ULL +504,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +512,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +520,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +528,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +536,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +544,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +552,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +560,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +568,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +576,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +584,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +592,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +600,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +608,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +616,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +624,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +632,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +640,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +648,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +656,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +664,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +672,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +680,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +688,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +696,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +704,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +712,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +720,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +728,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +736,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +744,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +752,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +760,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +768,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +776,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +784,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +792,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +800,0x80000000000041C8ULL);
lv2poke(0x8000000000003D90ULL +808,0x80000000000041CCULL);
lv2poke(0x8000000000003D90ULL +816,0x80000000000041D4ULL);
lv2poke(0x8000000000003D90ULL +824,0x80000000000041D8ULL);
lv2poke(0x8000000000003D90ULL +832,0x80000000000041DCULL);
lv2poke(0x8000000000003D90ULL +840,0x80000000000041ECULL);
lv2poke(0x8000000000003D90ULL +848,0x80000000000041F0ULL);
lv2poke(0x8000000000003D90ULL +856,0x8000000000003D90ULL);
lv2poke(0x8000000000003D90ULL +864,0x80000000000041F4ULL);
lv2poke(0x8000000000003D90ULL +872,0x80000000000041F8ULL);
lv2poke(0x8000000000003D90ULL +880,0x8000000000004210ULL);
lv2poke(0x8000000000003D90ULL +888,0x8000000000004214ULL);
lv2poke(0x8000000000003D90ULL +896,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +904,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +912,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +920,0x8000000000004130ULL);
lv2poke(0x8000000000003D90ULL +928,0x7C0802A6F821FF61ULL);
lv2poke(0x8000000000003D90ULL +936,0xFB610078FB810080ULL);
lv2poke(0x8000000000003D90ULL +944,0xFBA10088FBC10090ULL);
lv2poke(0x8000000000003D90ULL +952,0xFBE10098F80100B0ULL);
lv2poke(0x8000000000003D90ULL +960,0x706300FF2823000CULL);
lv2poke(0x8000000000003D90ULL +968,0x408000543BE00001ULL);
lv2poke(0x8000000000003D90ULL +976,0x7BFFF80667FB0000ULL);
lv2poke(0x8000000000003D90ULL +984,0x637B40B0787C1F24ULL);
lv2poke(0x8000000000003D90ULL +992,0x7F7BE214EBBB0000ULL);
lv2poke(0x8000000000003D90ULL +1000,0x7C8323787CA42B78ULL);
lv2poke(0x8000000000003D90ULL +1008,0x7CC533784800003DULL);
lv2poke(0x8000000000003D90ULL +1016,0xEB610078EB810080ULL);
lv2poke(0x8000000000003D90ULL +1024,0xEBA10088EBC10090ULL);
lv2poke(0x8000000000003D90ULL +1032,0xEBE10098E80100B0ULL);
lv2poke(0x8000000000003D90ULL +1040,0x382100A07C0803A6ULL);
lv2poke(0x8000000000003D90ULL +1048,0x4E8000203C608001ULL);
lv2poke(0x8000000000003D90ULL +1056,0x606300034BFFFFD4ULL);
lv2poke(0x8000000000003D90ULL +1064,0x3860FFFF4BFFFFCCULL);
lv2poke(0x8000000000003D90ULL +1072,0x7FA903A64E800420ULL);
lv2poke(0x8000000000003D90ULL +1080,0x4BFFFFE438600007ULL);
lv2poke(0x8000000000003D90ULL +1088,0x4E80002048079F2CULL);
lv2poke(0x8000000000003D90ULL +1096,0x4804A3707C6903A6ULL);
lv2poke(0x8000000000003D90ULL +1104,0x7C8323787CA42B78ULL);
lv2poke(0x8000000000003D90ULL +1112,0x4E8004204805CE44ULL);
lv2poke(0x8000000000003D90ULL +1120,0x480602784BFFFFC4ULL);
lv2poke(0x8000000000003D90ULL +1128,0x7C641B7867FB0000ULL);
lv2poke(0x8000000000003D90ULL +1136,0x637B4110E87B0000ULL);
lv2poke(0x8000000000003D90ULL +1144,0xF89B00004E800020ULL);
lv2poke(0x8000000000003D90ULL +1152,0x4BFFFFA84BFFFFA4ULL);
lv2poke(0x8000000000003D90ULL +1160,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +1168,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +1176,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +1184,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +1192,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +1200,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +1208,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +1216,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +1224,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +1232,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +1240,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +1248,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +1256,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +1264,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +1272,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +1280,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +1288,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +1296,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +1304,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +1312,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +1320,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +1328,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +1336,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +1344,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +1352,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +1360,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +1368,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +1376,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +1384,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +1392,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +1400,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +1408,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +1416,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +1424,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +1432,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +1440,0x0000000000000000ULL);
lv2poke(0x8000000000003D90ULL +1448,0x0000000000000000ULL);
lv2poke(0x80000000002C3D04ULL,0x4BD4017C4BD8AA15ULL);
lv2poke(0x800000000035DD00ULL,0x8000000000003E58ULL);
lv2poke(0x80000000000571E8ULL,0x600000002F840004ULL);//
lv2poke(0x80000000000571F0ULL,0x48000098E8629870ULL);//
lv2poke(0x800000000005ABACULL,0x60000000E8610188ULL);//
lv2poke(0x800000000005ABA0ULL,0x600000005463063EULL);//
lv2poke(0x8000000000057174ULL,0x63FF003D60000000ULL); //
lv2poke(0x800000000005723cULL,0x3FE080013BE00000ULL); //
11223 characters / 190 lines
pastie-1430104
## COMPILING
[~]$ gcc -o hexkey2bin hexkey2bin.c
(made a minor edit hope you dont mind - changed "" to on line 92
--busdriver
## USE TESTS
[~]$ ./hexkey2bin "945b99c0e69caf0558c588b95ff41b232660ecb017741f3218c12f9dfdeede55" test.bin
len: 32
bin_key:
94 5b 99 c0 e6 9c af 05 58 c5 88 b9 5f f4 1b 23 26 60 ec b0 17 74 1f 32 18 c1 2f 9d fd ee de 55
[~]$ xxd test.bin
0000000: 945b 99c0 e69c af05 58c5 88b9 5ff4 1b23 .[......X..._..#
0000010: 2660 ecb0 1774 1f32 18c1 2f9d fdee de55 &`...t.2../....U
[~]$ ./hexkey2bin "94 5b 99 c0 e6 9c af 05 58 c5 88 b9 5f f4 1b 23 26 60 ec b0 17 74 1f 32 18 c1 2f 9d fd ee de 55" spacetest.bin
len: 32
bin_key:
94 5b 99 c0 e6 9c af 05 58 c5 88 b9 5f f4 1b 23 26 60 ec b0 17 74 1f 32 18 c1 2f 9d fd ee de 55
[~]$ xxd spacetest.bin
0000000: 945b 99c0 e69c af05 58c5 88b9 5ff4 1b23 .[......X..._..#
0000010: 2660 ecb0 1774 1f32 18c1 2f9d fdee de55 &`...t.2../....U
[~]$ ./hexkey2bin "0x94 0x5b 0x99 0xc0 0xe6 0x9c 0xaf 0x05 0x58 0xc5 0x88 0xb9 0x5f 0xf4 0x1b 0x23 0x26 0x60 0xec 0xb0 0x17 0x74 0x1f 0x32 0x18 0xc1 0x2f 0x9d 0xfd 0xee 0xde 0x55" hextest.bin
len: 32
bin_key:
94 5b 99 c0 e6 9c af 05 58 c5 88 b9 5f f4 1b 23 26 60 ec b0 17 74 1f 32 18 c1 2f 9d fd ee de 55
[~]$ xxd hextest.bin
0000000: 945b 99c0 e69c af05 58c5 88b9 5ff4 1b23 .[......X..._..#
0000010: 2660 ecb0 1774 1f32 18c1 2f9d fdee de55 &`...t.2../....U
[~]$ ./hexkey2bin "0x94, 0x5b, 0x99, 0xc0, 0xe6, 0x9c, 0xaf, 0x05, 0x58, 0xc5, 0x88, 0xb9, 0x5f, 0xf4, 0x1b, 0x23, 0x26, 0x60, 0xec, 0xb0, 0x17, 0x74, 0x1f, 0x32, 0x18, 0xc1, 0x2f, 0x9d, 0xfd, 0xee, 0xde, 0x55" arraytest.bin
len: 32
bin_key:
94 5b 99 c0 e6 9c af 05 58 c5 88 b9 5f f4 1b 23 26 60 ec b0 17 74 1f 32 18 c1 2f 9d fd ee de 55
[~]$ xxd arraytest.bin
0000000: 945b 99c0 e69c af05 58c5 88b9 5ff4 1b23 .[......X..._..#
0000010: 2660 ecb0 1774 1f32 18c1 2f9d fdee de55 &`...t.2../....U
## CODE
//
// hexkey2bin.c
//
// by an0nym0us
//
// Jan.04.2011
#include
#include
#include
#define MAX_KEY 1024
#define VERSION "v0.01"
//------------------------------------------------------------------------------------------
int hex2bin(const char* hex, int n, void* pbin)
{
char* bin = (char*)pbin;
int c0, c1, i, h;
int j = 0;
if (!pbin || !hex)
{
return 0;
}
if (n <= 0)
{
n = strlen(hex); /* Get hex string length */
}
for (i = j = 0; i < n; i += 2)
{
c0 = hex[i];
if (i + 1 < n)
{
c1 = hex[i+1];
}
else
{
c1 = c0, c0 = '0';
}
if (isxdigit(c0) && isxdigit(c1))
{
if (isdigit(c1))
{
c1 -= '0';
}
else
{
c1 -= (c1 < 'G'?'A':'a') - 10;
}
if (isdigit(c0))
{
c0 -= '0';
}
else
{
c0 -= (c0 < 'G'?'A':'a') - 10;
}
h = (c0 << 4)|c1;
bin[j++] = h;
}
else /* Ignore orphan hex digits. */
{
--i; /* Try from the next char */
}
}
return j;
}
//------------------------------------------------------------------------------------------
//
// main
//
int main ( int argc, char **argv )
{
int i, len, ret ;
FILE *outfile ;
const char version[] = VERSION ;
unsigned char bin_key[MAX_KEY] ;
//------------------------------------------------------------------------------------------
//
// Verify args
//
if ( argc != 3 )
{
printf ( "%s :: %s :: by an0nym0us\n", argv[0], version ) ;
printf ( "Usage: %s\n", argv[0] ) ;
return - 1 ;
}
//------------------------------------------------------------------------------------------
//
// open filehandle to key file
//
outfile = fopen ( argv[2], "wb" ) ;
if ( outfile == NULL )
{
fprintf ( stderr, "ERROR::hexkey2bin::couldn't open output file '%s'\n", argv[2] ) ;
exit ( 1 ) ;
}
//------------------------------------------------------------------------------------------
//
// Convert hex key to binary
//
memset ( bin_key, 0, sizeof ( bin_key ) ) ;
len = hex2bin ( argv[1], strlen( argv[1] ), (void*)bin_key ) ;
printf ( "len: %d\n", len ) ;
//------------------------------------------------------------------------------------------
//
// Write hex key binary to key file
//
if ( outfile )
{
ret = fwrite( bin_key, 1, len, outfile ) ;
if ( ret != len )
{
fprintf ( stderr, "ERROR::heyhex2bin::writing key file, [%d] != [%d]\n", ret, len ) ;
exit ( 1 ) ;
}
}
//------------------------------------------------------------------------------------------
//
// Close filehandles
//
fclose ( outfile ) ;
//------------------------------------------------------------------------------------------
//
// Output now binary key as hex
//
printf ( "bin_key:\n" ) ;
for ( i = 0 ; i < len ; i++ )
{
printf ( "%02x ", bin_key[i] ) ;
}
printf ( "\n" ) ;
//------------------------------------------------------------------------------------------
return 0 ;
}
//EOF
pastie-2834445
## COMPILING
[~]$ gcc -o hexkey2bin hexkey2bin.c
(made a minor edit hope you dont mind - changed "" to on line 92
--busdriver
## USE TESTS
[~]$ ./hexkey2bin "945b99c0e69caf0558c588b95ff41b232660ecb017741f3218c12f9dfdeede55" test.bin
len: 32
bin_key:
94 5b 99 c0 e6 9c af 05 58 c5 88 b9 5f f4 1b 23 26 60 ec b0 17 74 1f 32 18 c1 2f 9d fd ee de 55
[~]$ xxd test.bin
0000000: 945b 99c0 e69c af05 58c5 88b9 5ff4 1b23 .[......X..._..#
0000010: 2660 ecb0 1774 1f32 18c1 2f9d fdee de55 &`...t.2../....U
[~]$ ./hexkey2bin "94 5b 99 c0 e6 9c af 05 58 c5 88 b9 5f f4 1b 23 26 60 ec b0 17 74 1f 32 18 c1 2f 9d fd ee de 55" spacetest.bin
len: 32
bin_key:
94 5b 99 c0 e6 9c af 05 58 c5 88 b9 5f f4 1b 23 26 60 ec b0 17 74 1f 32 18 c1 2f 9d fd ee de 55
[~]$ xxd spacetest.bin
0000000: 945b 99c0 e69c af05 58c5 88b9 5ff4 1b23 .[......X..._..#
0000010: 2660 ecb0 1774 1f32 18c1 2f9d fdee de55 &`...t.2../....U
[~]$ ./hexkey2bin "0x94 0x5b 0x99 0xc0 0xe6 0x9c 0xaf 0x05 0x58 0xc5 0x88 0xb9 0x5f 0xf4 0x1b 0x23 0x26 0x60 0xec 0xb0 0x17 0x74 0x1f 0x32 0x18 0xc1 0x2f 0x9d 0xfd 0xee 0xde 0x55" hextest.bin
len: 32
bin_key:
94 5b 99 c0 e6 9c af 05 58 c5 88 b9 5f f4 1b 23 26 60 ec b0 17 74 1f 32 18 c1 2f 9d fd ee de 55
[~]$ xxd hextest.bin
0000000: 945b 99c0 e69c af05 58c5 88b9 5ff4 1b23 .[......X..._..#
0000010: 2660 ecb0 1774 1f32 18c1 2f9d fdee de55 &`...t.2../....U
[~]$ ./hexkey2bin "0x94, 0x5b, 0x99, 0xc0, 0xe6, 0x9c, 0xaf, 0x05, 0x58, 0xc5, 0x88, 0xb9, 0x5f, 0xf4, 0x1b, 0x23, 0x26, 0x60, 0xec, 0xb0, 0x17, 0x74, 0x1f, 0x32, 0x18, 0xc1, 0x2f, 0x9d, 0xfd, 0xee, 0xde, 0x55" arraytest.bin
len: 32
bin_key:
94 5b 99 c0 e6 9c af 05 58 c5 88 b9 5f f4 1b 23 26 60 ec b0 17 74 1f 32 18 c1 2f 9d fd ee de 55
[~]$ xxd arraytest.bin
0000000: 945b 99c0 e69c af05 58c5 88b9 5ff4 1b23 .[......X..._..#
0000010: 2660 ecb0 1774 1f32 18c1 2f9d fdee de55 &`...t.2../....U
## CODE
//
// hexkey2bin.c
//
// by an0nym0us
//
// Jan.04.2011
#include
#include
#include
#define MAX_KEY 1024
#define VERSION "v0.01"
//------------------------------------------------------------------------------------------
int hex2bin(const char* hex, int n, void* pbin)
{
char* bin = (char*)pbin;
int c0, c1, i, h;
int j = 0;
if (!pbin || !hex)
{
return 0;
}
if (n <= 0)
{
n = strlen(hex); /* Get hex string length */
}
for (i = j = 0; i < n; i += 2)
{
c0 = hex[i];
if (i + 1 < n)
{
c1 = hex[i+1];
}
else
{
c1 = c0, c0 = '0';
}
if (isxdigit(c0) && isxdigit(c1))
{
if (isdigit(c1))
{
c1 -= '0';
}
else
{
c1 -= (c1 < 'G'?'A':'a') - 10;
}
if (isdigit(c0))
{
c0 -= '0';
}
else
{
c0 -= (c0 < 'G'?'A':'a') - 10;
}
h = (c0 << 4)|c1;
bin[j++] = h;
}
else /* Ignore orphan hex digits. */
{
--i; /* Try from the next char */
}
}
return j;
}
//------------------------------------------------------------------------------------------
//
// main
//
int main ( int argc, char **argv )
{
int i, len, ret ;
FILE *outfile ;
const char version[] = VERSION ;
unsigned char bin_key[MAX_KEY] ;
//------------------------------------------------------------------------------------------
//
// Verify args
//
if ( argc != 3 )
{
printf ( "%s :: %s :: by an0nym0us\n", argv[0], version ) ;
printf ( "Usage: %s\n", argv[0] ) ;
return - 1 ;
}
//------------------------------------------------------------------------------------------
//
// open filehandle to key file
//
outfile = fopen ( argv[2], "wb" ) ;
if ( outfile == NULL )
{
fprintf ( stderr, "ERROR::hexkey2bin::couldn't open output file '%s'\n", argv[2] ) ;
exit ( 1 ) ;
}
//------------------------------------------------------------------------------------------
//
// Convert hex key to binary
//
memset ( bin_key, 0, sizeof ( bin_key ) ) ;
len = hex2bin ( argv[1], strlen( argv[1] ), (void*)bin_key ) ;
printf ( "len: %d\n", len ) ;
//------------------------------------------------------------------------------------------
//
// Write hex key binary to key file
//
if ( outfile )
{
ret = fwrite( bin_key, 1, len, outfile ) ;
if ( ret != len )
{
fprintf ( stderr, "ERROR::heyhex2bin::writing key file, [%d] != [%d]\n", ret, len ) ;
exit ( 1 ) ;
}
}
//------------------------------------------------------------------------------------------
//
// Close filehandles
//
fclose ( outfile ) ;
//------------------------------------------------------------------------------------------
//
// Output now binary key as hex
//
printf ( "bin_key:\n" ) ;
for ( i = 0 ; i < len ; i++ )
{
printf ( "%02x ", bin_key[i] ) ;
}
printf ( "\n" ) ;
//------------------------------------------------------------------------------------------
return 0 ;
}
//EOF
tem mais uns downloads que podem ser interessantes , contendo os seguintes itens: patch431.xdelta , xdelta, mod431 , o link é:
mais artigos
esse se chama EID0 Key Seed
- Código:
Code:
AB CA AD 17 71 EF AB FC 2B 92 12 76 FA C2 13 0C
37 A6 BE 3F EF 82 C7 9F 3B A5 73 3F C3 5A 69 0B
08 B3 58 F9 70 FA 16 A3 D2 FF E2 29 9E 84 1E E4
D3 DB 0E 0C 9B AE B5 1B C7 DF F1 04 67 47 2F 85
esses eu não entendi direito mais de qualquer forma ai está:
code
2E D7 CE 8D 1D 55 45 45 85 BF 6A 32 81 CD 03 AF
c:\c2d> c2d.exe eid_root_key.bin flashCEX.bin flashDEX.bin EID key : 48 bytes (eid_root_key.bin) Flash size : 16 MB (flashCEX.bin) Target ID : $85 EID ROOT KEY: 64D20967DEACDA16ACADBE289B0EE2C25EE77331A5040C5DC9DF67B3FE574F6D EID ROOT IV : 6BD7C324D3B213A647DC31987345595E EID0 KEY : 9C1C4A93666EF67941F54679A7199D7553C8F0F50F3548C8966D6872FC8CD668 EID0 IV : 2DC374E270F851EB0D524F89790F2563 EID0 SEC KEY: 4C40F3E244EF2BF29A9D48BE26FEEEEB Target ID : $85 (from decrypted EID0 section) CMAC HASH : F1053CC3818DD6CE2775F0273DFC212E Writing modified flash (flashDEX.bin)... Done!
Última edição por artplayer2 em Ter 19 Fev 2013 - 2:11, editado 5 vez(es) (Motivo da edição : + informações)