-
Notifications
You must be signed in to change notification settings - Fork 31
/
HOWTO
333 lines (281 loc) · 19.3 KB
/
HOWTO
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
How to port to a new Firmware (but < 3.41):
Requirements:
- PSFreedom or PSGroove
- PL3
- ps3toolchain
- wireshark
- IDA 5.5+ (optional)
Note: ps3toolchain is a submodule of PL3 and PL3 is a submodule of PSGroove and
PSFreedom.
Step 1 - Finding the shellcode address
a. First disable the JIG mode by commenting the define USE_JIG in config.h, and
try to bruteforce the position/address of the payload with the shellcode_panic
payload until you can get a hit reliably (see http://pastie.org/1195108). The
address should be somewhere between 0x004e0000 and 0x00500000. Put the USB
device on the PS3 and use de trigger sequence (Power + Eject, then you should
listen 3 beeps), as soon PS3 boots it will activate the USB device and it should
blink. Then You will should have a hit, if your ps3 got frozen before displaying
any output and will blink the power light with the red color (this should take
something between 4s and 8s after the USB device light starts blinking).
If you haven't got a hit, then change the address by incrementing by one and try
again, remember to hard reset your ps3 (for slim unplug the energy cable).
b. Now that you got the hit, replace the payload with the dump_lv2 payload, and
connect the ps3 through ethernet to your PC and run wireshark to capture your
dump. Plug the device in the USB, turn on the PS3 and do the trigger sequence.
You should start receiving packets right after the USB device blink, the packets
are displayed with the protocol 0x1773. If you got somthing else, like
a bunch of DHCP requests or nothing at all, it may be a problem with the
payload_lv2 (i had to clean up PL3), make sure you got the ps3toolchain working
and is able to rebuild PL3. Once the ps3 panics (to tell you it's done), you
can save your wireshark dump to a file in .pcap format.
Note: You should set the JIG response to something easy to find in the dump,
in the case of PSGroove change the jig_response variable from descriptor.h
to something like:
const uint8_t PROGMEM jig_response[64] = {
"THIS IS THE JIG BUFFER RESPONSE"
};
c. Run the tools/dump_lv2_pcap_to_bin program to dump the lv2 binary from the
pcap file captured by wireshark - if this fails with a "Didn't find any data"
message you should add 4 bytes in the end of the structure ethernet_hdr_s and
try again.
d. Open the dump with IDA, set the processor to 'ppc', then run the
dump_lv2_analyzer.idc IDC file from the tools directory to get it analyzed and
follow the instructions (set TOC table in IDA options).
Once you are done, set the TOC_TABLE value in PSFreedom/PSGroove and set the
syscall_table define in firmware_symbols.h.S.
e. Then look for the position of the JIG response offset in the dump by
searching for the recognizable string you previously put in there. You can now
set the JIG response address in PSGroove/PSFreedom and test JIG mode with a
panic payload and the egghunter shellcode.
f. Now you can start looking for the various patch_funcX functions.
Note: For this you will most likely need a clean/unmodified dump of an already
supported firmware, so you can compare the asm code to find the right offsets.
Step 2 - Finding the various functions and patch addresses
a. The first step would be to go to label 'syscall_open' (set by the IDC), in
this sub you will find the subs for the alloc, free and patch_func3
(hooked_open). The free sub should be located at syscall_open + 0x1c4 (or
somewhere near), the free is the following bl instrunction, the alloc sub
should be at syscall_open + 0x248 (try to find the binary sequence
3FE08001F80100C8, this should be the only match) and the patch_func3 should
be at syscall_open + 0x264 (or near).
b. Then follow (enter) the patch_func3/hooked_open proc to find the 'strlen'
symbol (this will be the first bl in the function).
c. Once you have those, you should enter the strlen function then disable the
'chart' mode in IDA (press spacebar), then look at the function right below
strlen, it will be strncmp, and the function right above strlen will be strcpy.
You can also find memset here, if you scroll up from strcpy, the memset function
will be the 4th function above strcpy (so 3 functions are between them).
d. Now you need to find the functions to patch, let's start with function 1,
search for binary data in IDA and look for "3960006344000022", it should give
you one match. Go to it, and that's your patch_func1, the data being patched is
right after the 'hvsc' call, so count the number of instructions since the start
of patch_func1 up to, and including, the 'hvsc' instruction, and multiply by 4,
that should give you patch_func1_offset.
e. Now to find the patch_func2, search for binary data in IDA and look for the
sequence "380000013FE08001", it should give you one result, that's your
patch_func2. Now find the first 'bl' inside that function, and count how many
instructions are before the 'bl' (excluding the bl instruction), multiply by 4
and that's your patch_func2_offset.
f. The patch_func2 function gets branched to in the 'bl' instruction
at patch_func2 + patch_func2_offset, that's your 'memory_patch_func'.
g. Scroll a bit lower, and you should see a "ld %r28, qword_XYZXYZ", that qword
entry in the TOC is the 'rtoc_entry_2' value. Press the 'q' key while selecting
it to make IDA transform it into "-0xABCD(%rtoc)", the -0xABCD is the value you
want for rtoc_entry_2.
h. Now time for patch_func4, search for binary data in IDA and look for the
binary sequence "3C00800160000017", it should give you two results. Look at them
both, and compare with the original function from a supported firmware dump. It
should be pretty obvious which one is patch_func4, one of them is exactly the
same, the other is extremely different. If you do not have a dump to compare
to, the correct function should be the short one (in my version it has 3
blocks in graph view, the wrong function have way more blocks). Now you found
patch_func4.
i. Time for patch_func5, this one is easy if you have a supported dump
already, right click on it in the sub on the supported firmware and choose
"Chart of xrefs to", you will see that it gets called by almost every system
call, so choose any one of those syscalls and go to them, for the sake of this
guide, let's say we choose randomly syscall_29. Go to syscall_29 in the new dump
and compare it with the other dump, and you should spot the patch_func5 right
away, it should be the fourth 'bl' call and the last 'bl' before the 'bne' of
the first block of this syscall (in IDA chart view).
j. Now you need to find the slightly more difficult remaining offsets: memcpy,
patch_data1, rtoc_entry_1, and the overwritten function to use for MEM_BASE2.
k. Let's start with MEM_BASE2. Go to 'patch_func5', disable IDA's 'chart' mode,
then scroll down, all the way to the end of patch_func5, you will find a total
of 4 functions separating patch_func5 with the function in MEM_BASE2.
With MEM_BASE2 being the 5th function stacked after patch_func5. You can also
add 0x56C to the patch_func5 and see if it gives you the right function, it
should but it's not guaranteed, it will at least get you closer. You should
now switch back to 'chart' mode in IDA and quickly compare that function's
flowchart with the one from the supported firmware's dump if you have one. They
should be the same. Now let's make sure that the RESIDENT_PAYLOAD_MAXSIZE is
correct. Go to the end of this function, remove IDA's chart mode, and right
where you see the comment "End of function sub_XYZ", take that position,
substract it from MEM_BASE2 and you've got your RESIDENT_PAYLOAD_MAXSIZE (should
be 1296).
l. Now let's try to find rtoc_entry1, if you go to the rtoc_entry_1 offset in
the supported firmware's dump (TOC + rtoc_entry_1), press 'N' and rename that
data into 'rtoc_entry_1'. You will see IDA shows a 'DATA XREF' next to it that
points to a function, click on it. You found the function that uses that TOC
entry. Now disable chart mode in IDA and scroll up to the previous function, you
will find a small function that calls lv1_pause! This is our chance, looking at
the hex values of the "li %r11, 9; hvsc", start a binary search in the new
firmware IDA instance and look for "3960000944000022" It should give you a
single result, go to it, you found your lv1_pause call in the function just
above the one using rtoc_entry1, disable IDA's chart mode, scroll down to the
function below it and reenable chart mode. Now compare this function with the
one from the supported firmware, you should see that there is a 'ld %r9,
rtoc_entry_1' right below a 'bl __asm_func_dummy_X'. So look for that 'bl' in
your dump (should be the first one), and you will find the rtoc_entry_1 being
referenced in the line right below it. select it and press 'Q' in IDA to make it
show you the actual offset value in the "0xABCD(%rtoc)" form. You found
rtoc_entry_1.
m. Now we need to find the slightly harder patch_data1 offset. In your supported
firmware dump, go to the patch_data1 offset, press 'N' and rename it. Now you
will see a "DATA XREF" next to it which points to a "ROM:.." location, click on
it. You will find yourself on an entry in the TOC, rename that entry as
'patch_data1_toc' and look for the "DATA XREF" that uses it, there should be
two functions shown that references that patch_data1_toc entry, try them both,
first rename them into something easier to read, like 'patch_data1_func1' and
'patch_data1_func2', then go to each function and right click on it and choose
"Chart of xrefs to". Both functions should only be called by one other function
in its 'xrefs to' chart. One of the 'patch_data1_funcX' function will be called
by some other random sub_XYZ function, but the other one will be called by
syscall_470, we got an entry point to this! Now go to syscall_470.
Switch back to your new dump and also go there to syscall_470, now compare both
syscalls, it should be fairly easy to spot the patch_data1_func1 function in
the syscall, it would be the last 'bl' in the flowchart. Now jump to it and look
for the reference to patch_data1_toc, it should be the first 'ld' instruction
of the patch_data1_func1 function, now you found it, jump to it. You are now in
the TOC of your new firmware dump, and you see the value that TOC entry points
to.. it should be 0x80000000XYABCDEF. That's your patch_data1 value, remove the
0x80000000 prefix, and set the XYABCDEF value as the patch_data1 in macros.h.S
n. Now the 'memcpy'. This one is easy to find but the technique is a bit
trickier. Through all of this, we didn't yet find by luck a function that uses
memcpy (unlike alloc/free/strlen/strcpy/strncmp), so we need to find it
differently, if we go to memcpy, we cannot ask IDA to draw a "Chart of xrefs to"
for it, don't even try it, it's used in so many places that IDA or the
chart-viewer app will freeze! What we can do however is disable IDA's "chart"
mode, and go to the memcpy function declaration, then we should see IDA being
nice enough to give two "CODE XREF" let's follow those two and see who calls
those functions, and try to drill down from there until we find the memcpy
location. Luckily, one of those two functions uses hypercalls as you can see the
'lv1_undocumented_function_109' and 'lv1_undocumented_function_107' comments as
soon as we enter one of the xref functions (if you don't see this maybe IDA gave
you different xrefs, it's ok, continue reading). So we see that memcpy is used
between a hvsc 109 and a hvsc 107. We can't really do a binary search on the "li
%r11, 0x6B; hvsc" since there's a "ld %r7, 0x10(%r31)" in the middle, and a
different kernel build might use a different register or a different offset to
%r31, so let's stay safe, and let's search only for the "li %r11, 0x6B", so open
the binary search of IDA and search for "3960006B". It should give you 3 results
(maybe not, depending on the dump you're analyzing). Go to each one of them,
they should appear as the only hypercall in the function for two of them, but
for one of the functions found, it will be between a call to hvsc 109 and hvsc
107. You found your memcpy!
o. // Write here how to find: patch_func6, patch_func7 (this is syscall_512),
patch_func8, patch_dup_fromuser (binary search for "7b40052023a01000"), USB*.
p. To find the patch_func9, you should search for the binary "60630019". This
should give you just one match pointing to the instruction "ori %r3, %r3, 0x19".
The patch_func9 address is the XYZ address of the name sub_XYZ and the
patch_func9_offset should be 0x3ec, check that it is a "beq" instruction.
q. To find patch_syscall_func, go to 0xC00, press 'C' to convert it to code if
it is not, then follow it to (probably) 0xC20 (ori %r3, mtlr %r3, blr) then
follow it to the syscall handler (oris %r4, %r4, 0x?? - ori %r4, %r4, -0x???,
mtsrr0 %r4). Watch for the ori of negative value, that is the address of the
syscall handler, find blrl (probably offset 174), that is the instruction to
patch. Or search for the binary string "4e800021", it should find 4 entries, 3
of them are __asm_func_dummy_X. The first one, is the address of the instruction
'blrl' to be patched.
Step 3 - Finding the elfs
All right, we're done with the first part of the analysis, this whole thing
should have taken about an hour to do or less (unless you're writing a guide
at the same time :p).
a. Now let's start finding the hashes for the hash table and the offsets for the
user-space ELF files. Let's compile our payloads, add the version we're trying
to add in the Makefile by adding it to SUPPORTED_FIRMWARES and by adding a rule
for %_X_YZ.o: %.s which defines the -DFIRMWARE_X_YZ, then type make PL3.
In the project (PSGroove/PSFreedom), replace the PAYLOAD to use
payload_dump_elfs.
b. Now connect the PS3 with the ethernet cable to the PC and run wireshark, let
it boot, it should in theory be able to boot into the XMB if you found all the
correct offsets. Once it boots, you will see a lot of packets being captured
by wireshark. let it finish booting, then turn it off, save the wireshark dump
to a file, then run the ./tools/dump_elfs_pcap_to_bin utility on the .pcap file,
giving it a directory to output the files to.
c. Now search (grep) for the word 'category_game' in that directory, and it
should give you one file matching the string, the filename of that file will be
the value of HASH_TABLE_3 (prefix it with '0x'). Hex edit that file. In it, you
will find multiple references to 'category_game', you only need to find the one
that says 'category_game.xml#root' then followed by a few 0x00 values. The value
of 'elf3_data' is the offset where the '.xml' starts in that string.
d. Now look for a file with a size of 6MB or 7MB. This is the VSH (XMB) ELF
file, its filename is the HASH_TABLE_1 value. Open that file in IDA and let it
analyze it, it will complain a few times about wrong sizes and missing stuff,
ignore those warnings. Then once it loads and finishes the file analyzis, do a
binary search for "68000001540007FE". It should find two results, you need the
first one. The two results point to very similar functions, but one of them
contains a 'nop' after the 'bl' while the other doesn't. The one you want is the
one without the 'nop'. The offset of this function is the elf1_func1 offset. But
be aware that IDA will load the data with a start address of 0x10000, so make
sure you substract 0x10000 from the offset reported by IDA before setting it to
elf1_func1. The offset is 0x00 as this entire function will be overwritten.
e. Now let's find elf1_func2, do a binary search for "396000013803FF7F". It
should find one result, go to it, it should be a "li %r11, 1; addi %r0, %r3,
-0x81" instructions, the offset for elf1_func2 that you need is the offset of
the instruction "lhz %r3, 4(%r31)" just above that. You have found the
elf1_func2 offset, but don't forget to substract 0x10000 from the offset
reported by IDA.
f. You are ready for the second set of elf dumps! Now recompile everything and
run the exploit once more, but DO NOT connect the ethernet cable! Let the PS3
boot and connect your PS3 controller. You should now see the "Install package
files" option in the XMB. Congratulations! But it's not finished.
g. Now insert a USB device with a homebrew .pkg file on it, and then connect the
ethernet cable to your PC. Once the ethernet cable is connected, open the
"Install package files" menu and click on your .pkg to install it. It will
fail with a 0x80029519 (or 0x80029567) error. It's ok! You can also see a new
set of packets just got captured by wireshark. Now you have two choices, either
you open an existing application installed on your PS3, and once you do that,
press the PS button on your controller to open the in-game XMB (which will
freeze). Or you can just shut down your PS3 and do this later.
h. Now save your wireshark dump to a new .pcap file, and extract its content
with the tools/dump_elfs_pcap_to_dir utility. You will find a few new files
extracted but you need to notice the output of the tool! The very first file it
will write is the HASH_TABLE_2 value, it should be about 280K or 300K in size.
i. Open the file in IDA and set the processor type to 'ppc' then click ok. Run
the find_stdu.idc script to analyze the code (this is not a full ELF, only part
of it, so IDA cannot analyze it) and then search for the binary value
"3929FFFF793D0FE0", it should give you one result, open it. You should see the
instructions "addi %r9, %r9, -1; rldicl %r29, %r9, 1, 63". The address of
the sub found is the elf2_func1 value that you want. Note that since this wasn't
analyzed by IDA and not recognized as an ELF, so the data is not shifted so the
offset value given to you by IDA is the offset you want, do not substract
0x10000 from it, use it as is! The elf2_func1_offset should be 0x374, so it
should point to a 'beq' instruction that will jump to a piece of code with the
comment with the error code (in my case it was 0x80029567).
j. Now the only thing remaining is the HASH_TABLE_4 and elf4_data! If you did
open a game earlier for the second set of elf dumps, and tried to access the
in-game XMB, then skip this step, otherwise:
--Now recompile everything and rerun the exploit, you should now be able to both
--install and run homebrew applications! once you have installed and ran an
--application, connect the ethernet cable to your PC, start wireshark, then you
--can press the PS button on the controller to bring the in-game XMB. It will
--crash, but that's all you need. Now shut down the PS3, and save the wireshark
--dump and run the tools/dump_elfs_pcap_to_bin on it.
k. Now this is where we join for the final step, search in the files (grep) for
the "category_game.xml" string, you should find one file (if you only search for
"category_game", you will find two files, you need the smaller file of the two
- one of them will be the same as HASH_TABLE_3, so you should stick with the
other one). Now you need to do the same thing as for elf3_data, look for the
'cateogry_game' string in the file with a hex editor until you find
"category_game.xml#root" followed by a few 0x00, and you need the offset of the
start of the ".xml". That's your elf4_data! Don't forget to copy the filename
(prefixed with '0x') to the HASH_TABLE_4 value.
You can now disable the dump_elfs payload and return everything back to normal,
i.e. use default_payload. Everything should work now! Congratulations!
Now you just need to test it, boot it up, look for the menu, install a .pkg file
and try to run it, then make sure the in-game XMB works as it should and you're
done! git commit all your changes, push them and make sure they get integrated
with the upstream repository!
All this should take between one and two hours of work.
Good luck!
KaKaRoTo