Announcement

Collapse
No announcement yet.

Hacking the psp...

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Hacking the psp...

    well as most of you at this point are not aware of, me and my offiliats at DC949 have started a small (hack the psp) project (yes i know there is plenty of compitition and in the hacking of consoles we are all essentialy n00bs. ) that been said i figured that you would all like to see some of the packet dumps of the psp runing in "host" mode when playing the "dark stalkers" title

    ***************************data******************* *****************

    No. Time Source Destination Protocol Info
    1 0.000000 Sony_39:5f:42 Broadcast 0x88c8 Ethernet II

    Frame 1 (148 bytes on wire, 148 bytes captured)
    Arrival Time: Mar 29, 2005 19:27:14.832717000
    Time delta from previous packet: 0.000000000 seconds
    Time since reference or first frame: 0.000000000 seconds
    Frame Number: 1
    Packet Length: 148 bytes
    Capture Length: 148 bytes
    Ethernet II, Src: 00:01:4a:39:5f:42, Dst: ff:ff:ff:ff:ff:ff
    Destination: ff:ff:ff:ff:ff:ff (Broadcast)
    Source: 00:01:4a:39:5f:42 (Sony_39:5f:42)
    Type: Unknown (0x88c8)
    Data (134 bytes)

    0000 ff ff ff ff ff ff 00 01 4a 39 5f 42 88 c8 00 01 ........J9_B....
    0010 01 02 00 80 55 6e 6b 6e 6f 77 6e 20 46 61 63 74 ....Unknown Fact
    0020 6f 72 20 00 ff ff ff ff ff ff ff ff ff ff ff ff or .............
    0030 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ................
    0040 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ................
    0050 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ................
    0060 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ................
    0070 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ................
    0080 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ................
    0090 ff ff ff ff ....
    No. Time Source Destination Protocol Info
    2 1.001146 Sony_39:5f:42 Broadcast 0x88c8 Ethernet II

    Frame 2 (148 bytes on wire, 148 bytes captured)
    Arrival Time: Mar 29, 2005 19:27:15.833863000
    Time delta from previous packet: 1.001146000 seconds
    Time since reference or first frame: 1.001146000 seconds
    Frame Number: 2
    Packet Length: 148 bytes
    Capture Length: 148 bytes
    Ethernet II, Src: 00:01:4a:39:5f:42, Dst: ff:ff:ff:ff:ff:ff
    Destination: ff:ff:ff:ff:ff:ff (Broadcast)
    Source: 00:01:4a:39:5f:42 (Sony_39:5f:42)
    Type: Unknown (0x88c8)
    Data (134 bytes)

    0000 ff ff ff ff ff ff 00 01 4a 39 5f 42 88 c8 00 01 ........J9_B....
    0010 01 02 00 80 55 6e 6b 6e 6f 77 6e 20 46 61 63 74 ....Unknown Fact
    0020 6f 72 20 00 ff ff ff ff ff ff ff ff ff ff ff ff or .............
    0030 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ................
    0040 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ................
    0050 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ................
    0060 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ................
    0070 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ................
    0080 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ................
    0090 ff ff ff ff ....
    No. Time Source Destination Protocol Info
    3 1.402635 Sony_39:5f:42 Broadcast 0x88c8 Ethernet II

    Frame 3 (80 bytes on wire, 80 bytes captured)
    Arrival Time: Mar 29, 2005 19:27:16.235352000
    Time delta from previous packet: 0.401489000 seconds
    Time since reference or first frame: 1.402635000 seconds
    Frame Number: 3
    Packet Length: 80 bytes
    Capture Length: 80 bytes
    Ethernet II, Src: 00:01:4a:39:5f:42, Dst: ff:ff:ff:ff:ff:ff
    Destination: ff:ff:ff:ff:ff:ff (Broadcast)
    Source: 00:01:4a:39:5f:42 (Sony_39:5f:42)
    Type: Unknown (0x88c8)
    Data (66 bytes)

    0000 ff ff ff ff ff ff 00 01 4a 39 5f 42 88 c8 00 02 ........J9_B....
    0010 b4 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
    0020 61 c1 05 6a 98 69 7b 63 2b 81 eb a2 15 6a ac 70 a..j.i{c+....j.p
    0030 f2 49 3d 6b 91 ca 3a d9 7c 26 31 4a 1a f6 4e f0 .I=k..:.|&1J..N.
    0040 7b d5 cd f6 d4 2c 9c 6b 75 d3 57 ba 56 a3 91 91 {....,.ku.W.V...
    No. Time Source Destination Protocol Info
    4 2.002704 Sony_39:5f:42 Broadcast 0x88c8 Ethernet II

    Frame 4 (148 bytes on wire, 148 bytes captured)
    Arrival Time: Mar 29, 2005 19:27:16.835421000
    Time delta from previous packet: 0.600069000 seconds
    Time since reference or first frame: 2.002704000 seconds
    Frame Number: 4
    Packet Length: 148 bytes
    Capture Length: 148 bytes
    Ethernet II, Src: 00:01:4a:39:5f:42, Dst: ff:ff:ff:ff:ff:ff
    Destination: ff:ff:ff:ff:ff:ff (Broadcast)
    Source: 00:01:4a:39:5f:42 (Sony_39:5f:42)
    Type: Unknown (0x88c8)
    Data (134 bytes)

    0000 ff ff ff ff ff ff 00 01 4a 39 5f 42 88 c8 00 01 ........J9_B....
    0010 01 02 00 80 55 6e 6b 6e 6f 77 6e 20 46 61 63 74 ....Unknown Fact
    0020 6f 72 20 00 ff ff ff ff ff ff ff ff ff ff ff ff or .............
    0030 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ................
    0040 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ................
    0050 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ................
    0060 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ................
    0070 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ................
    0080 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ................
    0090 ff ff ff ff ....
    No. Time Source Destination Protocol Info
    5 3.018739 Sony_39:5f:42 Broadcast 0x88c8 Ethernet II

    Frame 5 (148 bytes on wire, 148 bytes captured)
    Arrival Time: Mar 29, 2005 19:27:17.851456000
    Time delta from previous packet: 1.016035000 seconds
    Time since reference or first frame: 3.018739000 seconds
    Frame Number: 5
    Packet Length: 148 bytes
    Capture Length: 148 bytes
    Ethernet II, Src: 00:01:4a:39:5f:42, Dst: ff:ff:ff:ff:ff:ff
    Destination: ff:ff:ff:ff:ff:ff (Broadcast)
    Source: 00:01:4a:39:5f:42 (Sony_39:5f:42)
    Type: Unknown (0x88c8)
    Data (134 bytes)

    0000 ff ff ff ff ff ff 00 01 4a 39 5f 42 88 c8 00 01 ........J9_B....
    0010 01 02 00 80 55 6e 6b 6e 6f 77 6e 20 46 61 63 74 ....Unknown Fact
    0020 6f 72 20 00 ff ff ff ff ff ff ff ff ff ff ff ff or .............
    0030 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ................
    0040 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ................
    0050 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ................
    0060 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ................
    0070 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ................
    0080 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ................
    0090 ff ff ff ff ....
    No. Time Source Destination Protocol Info
    6 3.887404 Sony_39:5f:42 Broadcast 0x88c8 Ethernet II

    Frame 6 (80 bytes on wire, 80 bytes captured)
    Arrival Time: Mar 29, 2005 19:27:18.720121000
    Time delta from previous packet: 0.868665000 seconds
    Time since reference or first frame: 3.887404000 seconds
    Frame Number: 6
    Packet Length: 80 bytes
    Capture Length: 80 bytes
    Ethernet II, Src: 00:01:4a:39:5f:42, Dst: ff:ff:ff:ff:ff:ff
    Destination: ff:ff:ff:ff:ff:ff (Broadcast)
    Source: 00:01:4a:39:5f:42 (Sony_39:5f:42)
    Type: Unknown (0x88c8)
    Data (66 bytes)

    0000 ff ff ff ff ff ff 00 01 4a 39 5f 42 88 c8 00 02 ........J9_B....
    0010 b6 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
    0020 48 30 fd c8 db 0f 62 94 20 94 89 6c 95 6d 40 42 H0....b. ..l.m@B
    0030 7b 88 06 86 c1 58 37 ae a3 db d9 0f ce b2 45 0c {....X7.......E.
    0040 ed 4f 1f 92 73 a1 a0 f9 54 42 60 c1 b7 d5 6b 46 .O..s...TB`...kF
    No. Time Source Destination Protocol Info
    7 4.020429 Sony_39:5f:42 Broadcast 0x88c8 Ethernet II

    Frame 7 (148 bytes on wire, 148 bytes captured)
    Arrival Time: Mar 29, 2005 19:27:18.853146000
    Time delta from previous packet: 0.133025000 seconds
    Time since reference or first frame: 4.020429000 seconds
    Frame Number: 7
    Packet Length: 148 bytes
    Capture Length: 148 bytes
    Ethernet II, Src: 00:01:4a:39:5f:42, Dst: ff:ff:ff:ff:ff:ff
    Destination: ff:ff:ff:ff:ff:ff (Broadcast)
    Source: 00:01:4a:39:5f:42 (Sony_39:5f:42)
    Type: Unknown (0x88c8)
    Data (134 bytes)

    0000 ff ff ff ff ff ff 00 01 4a 39 5f 42 88 c8 00 01 ........J9_B....
    0010 01 02 00 80 55 6e 6b 6e 6f 77 6e 20 46 61 63 74 ....Unknown Fact
    0020 6f 72 20 00 ff ff ff ff ff ff ff ff ff ff ff ff or .............
    0030 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ................
    0040 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ................
    0050 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ................
    0060 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ................
    0070 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ................
    0080 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ................
    0090 ff ff ff ff ....

    ***************************data******************* *****************

    have fun my haxor buddies :P

    btw.... yes i know i cant spell :P

  • #2
    Same avatar as ndex....how confusing ;)

    Comment


    • #3
      Originally posted by Vyrus
      well as most of you at this point are not aware of, me and my offiliats at DC949 have started a small (hack the psp) project (yes i know there is plenty of compitition and in the hacking of consoles we are all essentialy n00bs. ) that been said i figured that you would all like to see some of the packet dumps of the psp runing in "host" mode when playing the "dark stalkers" title.
      I've some limited work at reverse engineering several network protocols, and it can be a lot of work, and often needs a little luck, but is very rewarding. :-D

      1) Do the most simple networking between PSP and capture-- use this as a baseline. Document hypothesis for what fields might be used for. Look for IFS by character. NULL? CR? CR/LF? Tab? Look for sections and estimate purposes like checksum fields and Length as well as "Player ID" and "Unit ID." If TCP/IP is used, only look at the payload of the TCP to begin with, then revisit.
      2) Once you have some good guesses for what fields may be used for, play very short network games start to finish. Compare the packets relayed to your initial model. (even if you must "die" really quickly-- minimize your data.)
      Repeat this process, and if you have others working on this, share the things you are nearly certain about, but keep your theories to yourself unless you get stuck. (Suggesting a bad path to others leads to many working on the same potential dead end.)
      3) repeat for new games. revise your hypothesis

      When you have an idea how it works, try to build a fake unit in software and have it send the same responses as what was captured to see if playback is effective. If so, verify your model by changing what works to see if the outcome is the same.

      This kind of work is fastest when you have a unit and sniffing/analysis software. If I had one of these and lots of free time, this would be great fun. :-)

      Good luck!

      Comment


      • #4
        Originally posted by TheCotMan
        I've some limited work at reverse engineering several network protocols, and it can be a lot of work, and often needs a little luck, but is very rewarding. :-D

        1) Do the most simple networking between PSP and capture-- use this as a baseline. Document hypothesis for what fields might be used for. Look for IFS by character. NULL? CR? CR/LF? Tab? Look for sections and estimate purposes like checksum fields and Length as well as "Player ID" and "Unit ID." If TCP/IP is used, only look at the payload of the TCP to begin with, then revisit.
        2) Once you have some good guesses for what fields may be used for, play very short network games start to finish. Compare the packets relayed to your initial model. (even if you must "die" really quickly-- minimize your data.)
        Repeat this process, and if you have others working on this, share the things you are nearly certain about, but keep your theories to yourself unless you get stuck. (Suggesting a bad path to others leads to many working on the same potential dead end.)
        3) repeat for new games. revise your hypothesis

        When you have an idea how it works, try to build a fake unit in software and have it send the same responses as what was captured to see if playback is effective. If so, verify your model by changing what works to see if the outcome is the same.

        This kind of work is fastest when you have a unit and sniffing/analysis software. If I had one of these and lots of free time, this would be great fun. :-)

        Good luck!

        thanx for the info man (/me shows his n00bness)

        Comment


        • #5
          btw...

          another little titbit i gatherd this morning, aperently there are sevral ways to upgrade the firmware, one of wich is through the memory stick, another is through the network. while i plan to log a packet capture of a network session and post it, i figured i would try my hand at "updateing" the psp firmware to a "linux moble" distro :P. in short, so far no luck but i have diserned that the update works by being stored in the PSP/GAMES/UPDATE folder and is called EBOOT.PBP. i tried renameing the file and it didnt work, as well as copying a distro boot file and nameing it that, that didnt work eather. i did however figure out that by makeing folders with wich ever name i wish and putting the update in there, the psp trys to run the image as a game, where as when in the update folder, the psp assumes that the image is indeed firmware. now acording to the documentation (offical), in the prosses of updateing the psp you make the UPDATE folder in the games dir, then place the update in the folder then run, and it will ask you if you want to run "now" or "later". suposidly if you say later then you can turn your psp off and reboot off the memory card (HINT HINT WINK WINK). I however could not test this because my firmwere is alredy the latest, so when i tried the update i got an error that said "your firmware needs no update". Just some food for thought, pm me of you got ideas :P...


          ps... when i tried to run the update in a folder i made (game folder) and tried to run it as a game and not an update i got the err...

          8002014 "Game could not be started"

          Comment


          • #6
            Originally posted by Vyrus
            another little titbit i gatherd this morning, aperently there are sevral ways to upgrade the firmware, one of wich is through the memory stick, another is through the network.
            Many network devices have historically used TFTP to download firmware updates. I was surprised to find this is still used today in some wireless access points. The PSP may use http or another method, but I include refrence to tftp in case you sniff it, so it won't be unexpected.

            Be careful with firmware updates-- in many devices, loading a bad firmware means, an unbootable device while in others, they offer a chance to reset to factory settings or require you test a new firmware before purging the old.

            I however could not test this because my firmwere is alredy the latest, so when i tried the update i got an error that said "your firmware needs no update".
            See if you have a way to reset your system to an older revision of firmware. Sometimes this is accomplished by holding down a rest button for a longer period than normal, or holding down other buttons during startup.

            I would expect this procedure to be documented. If not, try calling their tech support and claim that the latest firmware update seems to be causing problems, and ask how you can go back to an earlier release (Assuming there is one.)

            Comment


            • #7
              made some progress and closeing in on the compile the linux kernel stage, see the info at the new base for the project...

              http://dc949.diseasedmind.com/forum/viewtopic.php?t=37

              Comment


              • #8
                now HERE is some new data that will get your fingers itching :P

                so i told the psp to try and update itself over the internet useing my wifi network on dhcp... well it didnt update because my firmware is alredy current, but i did packet - sniff the session and i came up with the ip that it was talking to... so i port scann the ip (from an anonymous location :P "/me loves airsnarf") and get this... :P

                Starting nmap 3.75 ( http://www.insecure.org/nmap/ ) at 2005-03-31 17:21 PST
                Interesting ports on 69.50.184.85:
                (The 1647 ports scanned but not shown below are in state: closed)
                PORT STATE SERVICE
                22/tcp open ssh
                25/tcp filtered smtp
                53/tcp open domain
                57/tcp filtered priv-term
                80/tcp open http
                111/tcp filtered rpcbind
                139/tcp filtered netbios-ssn
                199/tcp open smux
                445/tcp filtered microsoft-ds
                515/tcp filtered printer
                587/tcp open submission
                1433/tcp filtered ms-sql-s
                1720/tcp filtered H.323/Q.931
                3306/tcp open mysql
                17300/tcp filtered kuang2
                27374/tcp filtered subseven

                btw.. if you visit port 80 over a web client it still has the apache test screen on it :P

                Comment


                • #9
                  Originally posted by Vyrus
                  now HERE is some new data that will get your fingers itching :P
                  This isn't much help...but
                  http://www.engadget.com/entry/1234000613038689/
                  Got IRC going..

                  Al
                  "Are my pants...threatening you?"

                  Comment


                  • #10
                    I would be helpful if someone made a UMD reader for the computer so you could see the updates that are on the disk.
                    "I wash my hands of those who imagine chattering to be knowledge, silence to be ignorance, and affection to be art." -Kahlil Gibran

                    "Half the world is composed of idiots, the other half of people clever enough to take indecent advantage of them." -Walter Kerr

                    Comment


                    • #11
                      The PSP was made by God...
                      Sorry, had to say it.

                      Al K. Lloyd
                      "Are my pants...threatening you?"

                      Comment


                      • #12
                        Looks like I need a new avatar.

                        See what happens when you ignore the forums for a while?

                        There is some really good info about reverse engineering on DT's site... actually.
                        That's my story and I'm sticking to it.

                        Comment


                        • #13
                          Here is an interesting article on how to disassemble the PSP. and suggestions on how to modify it. http://www.informit.com/articles/article.asp?p=380915
                          Note: this voids your warranty in a BIG way, forget replacing the unit if you screw it up after this! Also note this means you can probably make backups of your umd disks to computer with some modification. And if this is possible you can most likely find a way to read and write programs, updates, and other things for it too.
                          Good luck and happy hacking!
                          "I wash my hands of those who imagine chattering to be knowledge, silence to be ignorance, and affection to be art." -Kahlil Gibran

                          "Half the world is composed of idiots, the other half of people clever enough to take indecent advantage of them." -Walter Kerr

                          Comment


                          • #14
                            If you really want to hack the PSP the best bet is getting the media player running in SoftICE and looking for bad buffer checking on the media code, which is very likely littered with security vulnerabilities. Once you have found a buffer overflow you should be able to construct a media file that will boot whatever program you want.
                            45 5F E1 04 22 CA 29 C4 93 3F 95 05 2B 79 2A B0
                            45 5F E1 04 22 CA 29 C4 93 3F 95 05 2B 79 2A B1
                            [ redacted ]

                            Comment


                            • #15
                              Originally posted by bascule
                              If you really want to hack the PSP the best bet is getting the media player running in SoftICE and looking for bad buffer checking on the media code, which is very likely littered with security vulnerabilities. Once you have found a buffer overflow you should be able to construct a media file that will boot whatever program you want.
                              Wow, I never really thought of that, someone let me know if they can get it to work, my friend won't let me try it on his. He was more willing to let me take it apart! I don't have enough $$$ to buy one after getting a jeep.
                              "I wash my hands of those who imagine chattering to be knowledge, silence to be ignorance, and affection to be art." -Kahlil Gibran

                              "Half the world is composed of idiots, the other half of people clever enough to take indecent advantage of them." -Walter Kerr

                              Comment

                              Working...
                              X