By using this site, you agree to our Privacy Policy and our Terms of Use. Close

Forums - Sony Discussion - PS3 hacked by famous hacker

-Newcloud- said:
i hope this isnt true

It my very well be true, But also as What I posted, you may not even be able to do pretty much anything with the hack anyway.

due to the way the SPE keep's UNREG code away from the HYPERVISOR.

It pretty much shut's any Unreg code down. so your very limited in theory of what you could do with it anyway.

 



I AM BOLO

100% lover "nothing else matter's" after that...

ps:

Proud psOne/2/3/p owner.  I survived Aplcalyps3 and all I got was this lousy Signature.

Around the Network
joeorc said:
-Newcloud- said:
i hope this isnt true

It my very well be true, But also as What I posted, you may not even be able to do pretty much anything with the hack anyway.

due to the way the SPE keep's UNREG code away from the HYPERVISOR.

It pretty much shut's any Unreg code down. so your very limited in theory of what you could do with it anyway.

 

So he hacked it but it may turn out to be worthless?



so in short:

the online blog stated from the claimed hack

"
Hello hypervisor, I'm geohot

I have read/write access to the entire system memory, and HV level access to the processor. In other words, I have hacked the PS3. The rest is just software. And reversing. I have a lot of reversing ahead of me, as I now have dumps of LV0 and LV1. I've also dumped the NAND without removing it or a modchip.

IBM states:

All of this is accomplished exclusively by hardware means; no software, in the form of setting protection bits in an address translation table for example, is involved in the process. Because of this hardware isolation, even the operating system and the hypervisor cannot access the locked up LS or take control of the SPE core. Therefore, a hacker who has gained root or hypervisor privileges is not a threat to an application executing on an isolated SPE. The supervisory privileges will not enable him to control the application, nor will it allow him to read or write the memory used by it. The execution flow and the data of the isolated application are safe.

if he did what level of exploit would he indeed have?
that the real problem , what would the full capability of this hack?

my guess as it stand's not very much



I AM BOLO

100% lover "nothing else matter's" after that...

ps:

Proud psOne/2/3/p owner.  I survived Aplcalyps3 and all I got was this lousy Signature.

Oh well. This is only really an issue in terms of piracy right? I'm not quite sure many would want to pirate bluray content. Too big.



joeorc said:
-Newcloud- said:
i hope this isnt true

It my very well be true, But also as What I posted, you may not even be able to do pretty much anything with the hack anyway.

due to the way the SPE keep's UNREG code away from the HYPERVISOR.

It pretty much shut's any Unreg code down. so your very limited in theory of what you could do with it anyway.

 


So you are pretty much saying this hack could turn out to be a pretty useless excercise - in the general sense.

I don't really get all this stuff so forgive my ignorance.

Edit: Just read your last post. Thanks.



Around the Network
joeorc said:

so in short:

the online blog stated from the claimed hack

"
Hello hypervisor, I'm geohot

I have read/write access to the entire system memory, and HV level access to the processor. In other words, I have hacked the PS3. The rest is just software. And reversing. I have a lot of reversing ahead of me, as I now have dumps of LV0 and LV1. I've also dumped the NAND without removing it or a modchip.

IBM states:

All of this is accomplished exclusively by hardware means; no software, in the form of setting protection bits in an address translation table for example, is involved in the process. Because of this hardware isolation, even the operating system and the hypervisor cannot access the locked up LS or take control of the SPE core. Therefore, a hacker who has gained root or hypervisor privileges is not a threat to an application executing on an isolated SPE. The supervisory privileges will not enable him to control the application, nor will it allow him to read or write the memory used by it. The execution flow and the data of the isolated application are safe.

if he did what level of exploit would he indeed have?
that the real problem , what would the full capability of this hack?

my guess as it stand's not very much

 

 

Can you post the IBM source?



No its in no way useless. If he achieved what he claimed he opened the system. if you look at his blog and later in twitter the guy who critizised him and the people from ps3news believe that he probably achieved something. if he is correct then he found a way to crack the PS3

It maybe bad for Sony he may be wrong but if you read all the sources everybody take it as granted that he cracked the PS3.

I dont now much about this stuff but I am smart enough to recognize how the people which know more about this stuff react.

And they definetly think he achieved something even the people which joerc quoted said later that he probably found something.

The Hack could be useless but he is already known as one big hacker this guy seems to be a wunderkind. Or he had just luck.

We will see in the next weeks how it turns out I have the feeling he did it. If this exploit will be useful for the standard consumer is not sure.

I think he will publish this stuff sooner or later he has not sold his knowledge from the Iphone he gave it for free.

The guy which doubted him in the beginnig and later said on twitter that he talked with geohot and he had to admit that it seems like he cracked the PS3 is mateulh this guy cracked the PSP.

http://twitter.com/Mathieulh/status/8097806925

Everybody who is interested in it should read this thread and then decide for yourself:


http://www.ps3news.com/forums/ps3-hacks/playstation-3-hacked-george-hotz-hello-hypervisor-im-geohot-109519.html




impur1ty said:
joeorc said:

so in short:

the online blog stated from the claimed hack

"
Hello hypervisor, I'm geohot

I have read/write access to the entire system memory, and HV level access to the processor. In other words, I have hacked the PS3. The rest is just software. And reversing. I have a lot of reversing ahead of me, as I now have dumps of LV0 and LV1. I've also dumped the NAND without removing it or a modchip.

IBM states:

All of this is accomplished exclusively by hardware means; no software, in the form of setting protection bits in an address translation table for example, is involved in the process. Because of this hardware isolation, even the operating system and the hypervisor cannot access the locked up LS or take control of the SPE core. Therefore, a hacker who has gained root or hypervisor privileges is not a threat to an application executing on an isolated SPE. The supervisory privileges will not enable him to control the application, nor will it allow him to read or write the memory used by it. The execution flow and the data of the isolated application are safe.

if he did what level of exploit would he indeed have?
that the real problem , what would the full capability of this hack?

my guess as it stand's not very much

 

 

Can you post the IBM source?

 

I think this is the source

 

https://www-01.ibm.com/chips/techlib/techlib.nsf/techdocs/AEBFE7D58B5C36E90025737200624B33/$file/CBE_Secure_SDK_Guide_v3.0.pdf



Grimes said:

This sounds legit as it is the same guy who unlocked the iPhone.

http://www.engadget.com/2010/01/23/ps3-finally-properly-hacked/

In a post titled "Hello hypervisor, I'm geohot," hacker George Hotz (already known in the iPhone community) has made a strong claim: that he has cracked the PS3. The system has remained (mostly) uncompromised for over three years now, with a few exceptions here and there. But, this one pledges full read/write access to the entire system memory and complete control over the processor -- all without a mod chip. Has he really done it, if so how, and what comes next? That all remains to be seen. This exploit supposedly "isn't really patchable, but [Sony] can make implementations much harder," meaning he isn't tipping his hat until he's ready, because once he does the never-ending firmware update war begins, and as we've seen on the PSP, Sony can really knock out those updates.

the only SONY news you ever post is negative news, therefore I'm not surprised. Nothing wrong with posting negative news but that's all you do



blackops said:
Grimes said:

This sounds legit as it is the same guy who unlocked the iPhone.

http://www.engadget.com/2010/01/23/ps3-finally-properly-hacked/

In a post titled "Hello hypervisor, I'm geohot," hacker George Hotz (already known in the iPhone community) has made a strong claim: that he has cracked the PS3. The system has remained (mostly) uncompromised for over three years now, with a few exceptions here and there. But, this one pledges full read/write access to the entire system memory and complete control over the processor -- all without a mod chip. Has he really done it, if so how, and what comes next? That all remains to be seen. This exploit supposedly "isn't really patchable, but [Sony] can make implementations much harder," meaning he isn't tipping his hat until he's ready, because once he does the never-ending firmware update war begins, and as we've seen on the PSP, Sony can really knock out those updates.

the only SONY news you ever post is negative news, therefore I'm not surprised. Nothing wrong with posting negative news but that's all you do

 

Only this is positive news. But there's a lot of closed minded people around.