I agree with you, about your explanation about a classic exploit, cause it is absolutely right.
Originally Posted by dlanor
You know, that we need the DVDELF.bin/DVDPLx, to create a valid MCID.
So,... They give 50% (kbit) of MCID, afaik.
This is, why we're limited to embed our files to DVDELF.bin
So the way, how the re-encryption was done, especially how it was injected yet, could be called exploiting in classic way.
If it could directly encrypt it to full-free (<--I mean with Open Source) MG-Encrypted file, we are not limited to size of DVDELF.bin (only to given ELF-Size, we want to encrypt. ) and it will be no classic exploit anymore, but a fully rebuild of MG-Encryption-Routine.
Neme&Jimmi could explain it best.
Maybe Polo,... Thought he's on metagames &help(ed) cracking.
Btw.: Text-File? ^^ Aaaargh,... Bad samle, not?
Btw2.: Equal, how we call it.
It works. ^^
PS2 V7/DMS3 V2 (FW:2.4b7); Seagate Baracuda 200GB
PS2 V7/CC1.0 (FW:34 hacked v2 BM:2.1.6); Maxtor DiamondMAX9 PLUS 160GB
PS2 SCPH-30004R; NoMod+NoLaser
3xSony MC 8MB
MAX/Datel 16MB with Boot-CD
Custom FMCB 1.8b+ Beta-Build, my AIO 0.5, Sony&xRhino-Linux