The above video goes away if you are a member and logged in, so log in now!
Even if you cannot yet sign properly with "makeself", you can make fake SELF files using "make_fself."
Originally Posted by grandy
It will only work on jailbreaked PS3 but you can check if your devs/patches are running well.
It's a temporary solution which can help ;-)
I have fixed the header length issue. Its not giving error but returning to XMB. result is same for make_fself and make_fself_npdrm. I will try POP now. Attachment 592
Both Splatterhouse's and Red Dead Redemption Undead Nightmare eboots can't be modified with current method from Veritas - it was confirmed by the Veritas (who originally modified GT5, NFS and Tales of Graces) and by the people who modified other currently working eboots (PoP, Sly, etc) Thats too bad.
i need help when i finish installing (download and install).
when i open the home folder it says there should be a user folder made by the program but for some reason i don't see it or have one
any1 can share a light on this thanks
I hate to ask but I have been trying to figure it out myself for the last few hours, and searching all over as I don't like to ask questions. I am fine with getting the "eboot.elf" file, and opening that in the hex editor. I also have used the command "readself eboot.bin", and that is where I run in to problems, what am I modifying?
Where or how do I find the encryped metadata in the .elf or bin (whichever one it is I am suppose to be modifying) file for that matter to edit it?
I really hate to ask but I don't want to just download pre patched, I would rather have the knowledge.
Ok gravitysdepth so you have modify EBOOT.BIN and you go to youer C:\cygwin\home\(User)\ you should have the decrypted EBOOT.ELF now open youer hex editor now In eboot.elf, go to every encrypted metadata section (now decrypted), copy its data, and replace the encrypted data in EBOOT.BIN and save it . Hope it Helps you.
Originally Posted by gravitysdepth
save result of "readself eboot.bin". Look at SELF header , find value "header len". This is header length in hex. Now take first section from "Encrypted Metadata" take offset value and subtract "header len" from it , result will be offset of ELF file. Now you have two offset one from eboot.bin and one for ELF. Take size of the section and copy data from ELF to eboot. I used Linux dd command to achieved this (cygwin). I attached the script in my last post.
Originally Posted by gravitysdepth
POP is working with me but not through the eboot and self files modified by this way only.
I used the one modified by finalbyRikuKH3. I took the binary difference between both and found that some other work need to be done over eboots. There are 150 byte differences.
That's mean overwriting is working correctly but some other work is required.
can u point out what section ur refering too when u say first section from encrypted metadata from this please. thanks in advance im trying to learn this and i am struggling.
Originally Posted by fisacom
elf #1 offset: 00000000_00000090 header len: 00000000_00000980 meta offset: 00000000_00000410 phdr offset: 00000000_00000040 shdr offset: 00000000_003f73e8 file size: 00000000_003f7338 auth id: 10100000_01000003 (Unknown) vendor id: 01000002 info offset: 00000000_00000070 sinfo offset: 00000000_00000290 version offset: 00000000_00000390 MS-DOS style path detected: C:\cygwin\home\Aaron's\EBOOT.BIN control info: 00000000_000003c0 (00000000_00000070 bytes) P SDK type: unknown app type: application info control flags: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 file digest: 81 eb ed 3b 32 a4 b4 70 57 b3 74 16 c4 78 fe 3e a6 a5 f0 a4Section header offset size compressed unk1 unk2 encrypted 00000000_00000980 00000000_003a9ee8 [NO ] 00000000 00000000 [YES] 00000000_003b0980 00000000_00043c00 [NO ] 00000000 00000000 [YES] 00000000_003f4580 00000000_00000000 [NO ] 00000000 00000000 [YES] 00000000_003f4580 00000000_00000000 [NO ] 00000000 00000000 [YES] 00000000_003f4580 00000000_00000000 [NO ] 00000000 00000000 [YES] 00000000_003d1900 00000000_00000004 [NO ] 00000000 00000000 [N/A] 00000000_003aa800 00000000_00000028 [NO ] 00000000 00000000 [N/A] 00000000_003aa828 00000000_00000040 [NO ] 00000000 00000000 [N/A]Encrypted Metadata unable to decrypt metadataELF header type: Executable file machine: PowerPC64 version: 1 phdr offset: 00000000_00000040 shdr offset: 00000000_003f6af8 entry: 00000000_003cbc10 flags: 00000000 header size: 00000040 program header size: 00000038 program headers: 8 section header size: 00000040 section headers: 33 section header string table index:
Hello I followed this tutorial to decrypt a bin file from a 3.41 version game and I got the error "self_decrypt_header failed", can somebody tell me how can I fix this problem. Does the eboot.bin file needs to be from 3.5 firmware?
PS: I'm doing with a 3.41 firmware bin file just to test.
Thank you very much.