BwE Information & Validator

May 30, 2013

BwE has released a new Hombrew application dedicated on scanning and dumping necessary information for you PS3′s NAND. This app is actually quite useful for scene developers and even those who have flash tools who are looking to modify their firmware on their PS3. The app makes sure that all the necessary files are also there and verifies all MD5′s and ID’s in the NAND. There is no changelog with the application, but I have included a dump made by a PS3Hax member, check below.



UqgCUWw


 

 


ROS0 441.000 File Table; AuthID & MD5:
creserved_0 ✔
AuthID: N/A ✔
MD5: 09A1D434DBD7197E7C3AF8A7C28CA38B ✔
sdk_version ✔
AuthID: N/A ✔
[DANGER]- 1ACE0B566F3C918435395224A8D41800
spu_pkg_rvk_verifier.self ✔
AuthID: 1070000022000001 ✔
[DANGER]- 334864960650010F259CF024DC74C9F7
spu_token_processor.self ✔
AuthID: 1070000023000001 ✔
[DANGER]- 2702AAF5E12091500FC465CEF6792EDE
spu_utoken_processor.self ✔
AuthID: 107000004C000001 ✔
[DANGER]- DB777CC78D0126A1AC9831486602EB70
sc_iso.self ✔
AuthID: 1070000020000001 ✔
[DANGER]- 6943FCE42237242D02DE8E61B25C8EF3
aim_spu_module.self ✔
AuthID: 1070000025000001 ✔
[DANGER]- DEEE53CE82F44DE654D969EB5A15E4CC
spp_verifier.self ✔
AuthID: 1070000021000001 ✔
[DANGER]- 06CAD08136CE161A9ECBA703369FEDDF
mc_iso_spu_module.self ✔
AuthID: 1070000037000001 ✔
[DANGER]- 95537BC1D7D1A900F81017E3AA9681EA
me_iso_spu_module.self ✔
AuthID: 1070000043000001 ✔
[DANGER]- 6F9669CBA2824C0F4E6620E1D364006B
sv_iso_spu_module.self ✔
AuthID: 1070000024000001 ✔
[DANGER]- ECF2AEFC1E8C1BCF8C633F555A563A4C
sb_iso_spu_module.self ✔
AuthID: 107000001F000001 ✔
[DANGER]- 520CA3362C1652625B2548E6A1D199B2
sv_iso_for_ps2emu.self ✔
AuthID: 1070000059000001 ✔
[DANGER]- C1458DE986F16D8ADC8E19DED77C9B75
default.spp ✔
AuthID: N/A ✔
[DANGER]- 3253B21C4D23DF9B8F56B7B90349FFA5
lv1.self ✔
AuthID: 1FF0000002000001 ✔
[DANGER]- 897FB25B07925D74DF94F97FECEF8660
lv0 ✔
AuthID: 1FF0000001000001 ✔
[DANGER]- 321C2767380A53A076B730A50D980CD8
lv0.2 ✔
AuthID: 1FF0000001000001 ✔
[DANGER]- 40327817B9C0172B5F27EE761F0D24A3
lv2_kernel.self ✔
AuthID: 1050000003000001 ✔
[DANGER]- 82F6981183DDE3431CCF666307E89DDF
eurus_fw.bin ✔
AuthID: N/A ✔
MD5: B5F54D9A11D1EAE71F35B5907C6B9D3A ✔
emer_init.self ✔
AuthID: 10700003FC000001 ✔
[DANGER]- F5E81EA05E2C5888FE76A00D5F28E5B5
hdd_copy.self ✔
AuthID: 1070000501000001 ✔
[DANGER]- FC4EB8E2C55EEBFB6450A1D398DA492A
manu_info_spu_module.self ✔
AuthID: 1070000055000001 ✔
[DANGER]- 8EFD00CB6B92DD96A6C43D27ECD259E7
ROS1:
Header Filler - ✔
Length of Flash Region - 6FFFE0 ✔
Unknown Static - ✔
Entry Count - 19 ✔
Length of Flash Region 2 - 6FFFE0 ✔
ROS1 440.000 File Table; AuthID & MD5:
creserved_0 ✔
AuthID: N/A ✔
MD5: 09A1D434DBD7197E7C3AF8A7C28CA38B ✔
sdk_version ✔
AuthID: N/A ✔
[DANGER]- 74858C62B1645BB1F8C57665FD53F9A1
spu_pkg_rvk_verifier.self ✔
AuthID: 1070000022000001 ✔
[DANGER]- 5E0E9E8BAABFEA9DAB798D38F517707C
spu_token_processor.self ✔
AuthID: 1070000023000001 ✔
[DANGER]- 6CAA0F654191150935C6EBCBA5B40518
spu_utoken_processor.self ✔
AuthID: 107000004C000001 ✔
[DANGER]- 78D6A93580B3ACEC3A404AB37A7F654A
sc_iso.self ✔
AuthID: 1070000020000001 ✔
[DANGER]- 36A1C27D6950CDF83A08DD77059DC550
aim_spu_module.self ✔
AuthID: 1070000025000001 ✔
[DANGER]- 294695EA23D3569D34C7F0E0CCAE04A5
spp_verifier.self ✔
AuthID: 1070000021000001 ✔
[DANGER]- 0B769C15D04452C2F91B6A27EC5C8251
mc_iso_spu_module.self ✔
AuthID: 1070000037000001 ✔
[DANGER]- A02BC17E8ED634300A31BA783C480382
me_iso_spu_module.self ✔
AuthID: 1070000043000001 ✔
[DANGER]- 0CAE1D0AF7EEA1D23B95DF40812422CB
sv_iso_spu_module.self ✔
AuthID: 1070000024000001 ✔
[DANGER]- 5B35BB4EF4CE82349BB9BDFA0BED1B09
sb_iso_spu_module.self ✔
AuthID: 107000001F000001 ✔
[DANGER]- ED41E51637B6EA2B2AAB616182D6A83C
sv_iso_for_ps2emu.self ✔
AuthID: 1070000059000001 ✔
[DANGER]- 67373DCBE7F6F208B53A2DCC74E5531E
default.spp ✔
AuthID: N/A ✔
[DANGER]- 1B7D4D3CEB4CE0C586E7AE7FB14325E7
lv1.self ✔
AuthID: 1FF0000002000001 ✔
[DANGER]- 897081360F599281B5423143BFED661D
lv0 ✔
AuthID: 1FF0000001000001 ✔
[DANGER]- 60B7BF6BC96163109793DCDED75F88BF
lv0.2 ✔
AuthID: 1FF0000001000001 ✔
[DANGER]- 65F3583701F36C5C127F57B9E4BC4C48
lv2_kernel.self ✔
AuthID: 1050000003000001 ✔
[DANGER]- 9124888B472E7BAA04824D045B7B6210
eurus_fw.bin ✔
AuthID: N/A ✔
MD5: B5F54D9A11D1EAE71F35B5907C6B9D3A ✔
emer_init.self ✔
AuthID: 10700003FC000001 ✔
[DANGER]- 1FDFCFDAEEB0BB0C0C5A246702ECB6D1
hdd_copy.self ✔
AuthID: 1070000501000001 ✔
[DANGER]- A484DE8056F27F8D15BEE45408CD7CBE
manu_info_spu_module.self ✔
AuthID: 1070000055000001 ✔
[DANGER]- FD6F307EBF2B7640A75F11AC2064838E
CoreOS MD5 Validation:
ROS0: [DANGER] - A99F5D9E9C631CAEA6D805EDC73DF541
ROS1: [DANGER] - AEF60D87485B4D4B49766125290E020E

 

 

 

NOR/NAND Dump Information
Download

Then these boring two:

NOR Validator 1.31:
Download
Example: http://betterwayelectronics.com/Latest.html
Wiki Link: http://ps3devwiki.com/wiki/Validatin…_NOR_Validator

NAND Validator 1.01
Download
Example: http://betterwayelectronics.com/LatestNAND.html
Wiki Link: http://ps3devwiki.com/wiki/Validatin…NAND_Validator



Source: http://www.ps3hax.net/

Tags:

Tweet this!Tweet this!

Previous post:

Next post: