IDPS two thread bruteforce using “archive2.dat” from backup utility

IDPS two thread bruteforce using “archive2.dat” from backup utility.

usage : launch “idpsbf.exe” in same folder as “archive2.dat”, “keys.conf” and “salt”.

“salt” example.

00 00 00 01 00 87 00 06 00 00 00 00 00 00 00 00

The first 8 bytes should be known based on serial number and ps3devwiki info.

Bruteforcing is only done on last 8 bytes, Every even try on thread 0.

“salt” can be set to any value.

“archive2.dat” should be from formatted ps3‘s backup.

outputs IDPS to “idps.bin”

 

based on code by zecoxao.

 

https://mega.nz/#!Sp0lgAzJ!ar-9BFogpa83lR0CLlU4Bf5J2bJBbzOuh81OvL8gUvM

MD5:315a9bf8ba3c6456ed87a68b2e5e17e7

SHA256:64e6b71c185d8c63ba1b784e4dd5292ab435fa9baab5e33876a23cb495be89f9

File name:idpsbf.exe

 

https://www.virustotal.com/en/file/64e6b71c185d8c63ba1b784e4dd5292ab435fa9baab5e33876a23cb495be89f9/analysis/1451779772/

 

One thought on “IDPS two thread bruteforce using “archive2.dat” from backup utility

  1. Every time I hit a Enter on keyboard, it gives me a different number. So, what’s the exact number of my IDPS? How do I know which one is real?

Leave a Reply