It’s only been a week since CEX-to-DEX was leaked online and we already have a third tool released that intends to make the whole conversion process that much easier. PlayStation 3 homebrew developer of PS3News, Gunner54, has released an application he calls “PS3 CEX2DEX Application,” a tool that will extract the METLDR from any PlayStation 3 flash dump and convert it from retail to debug/test. The application sports a friendly UI and performs two primary functions:
- EXTRACT METLDR
Prerequisites: MSVCP100.DLL and Microsoft Visual C++ 2010 Redistributable Package (x86)
Have fun converting your units but always remember that there is always a possibility of your console bricking when tampering with the flash so proceed with absolute caution!
Following up on the recent PS3 C2D CEX to DEX Flash Patcher and PS3Tools GUI Edition v2.6, today I have released a CEX2DEX application that will allow you to extract the METLDR from ANY (NOR / NAND) PlayStation 3 flash dump and create a valid DEX (Debug / Test) flash from the given CEX (Retail) flash.
Download: PS3 CEX2DEX Application / MSVCP100.DLL (Required) / Microsoft Visual C++ 2010 Redistributable Package (x86)
- Can be used to extract the METLDR from ANY (NOR/NAND) flash dump.
- Can be used to create a valid DEX flash from any given CEX flash (NOR/NAND).
I will explain the two main options the program has.
Extract METLDR – This extracts the metldr from your flash dump so you can use this in the metldrpwn exploit and dump your root key. The dump file created by the metldrpwn exploit can then be loaded into the program (METLDR Dump).
CEX -> DEX – This creates a modified flash dump to convert your CEX into a DEX, the dump created can then be used to be flashed back to your PS3.
I assume you are getting those CMAC errors because you are attempting to use the extracted metldr as the metldr dump. These are two completely different files, the METLDR Dump is the dump file produced by the metldrpwn exploit. Could you show me part of your root key so I can get a better understanding of what you’re actually loading.