IDPS Dumper (PS3 NAND/NOR)
Following the official announcement of the PS3Xploit news (4.81 OFW Exploit), the devs behind the project have fulfilled the promises of releasing the IDPS Dumper for OFW 4.81/4.82 as this release is ready for the public. Now there is many more things being worked surrounding the overall project but this IDPS Dumper works on all models of the PS3 (NOR and NAND, note 12 GB EMMC will be supported soon in an updated release) and no reason not to release this tool. Since PS3 firmware 4.70 Sony had blocked flatz IDPS extracting tool (IDPS Stealer) and there has not been a known way to obtain the IDPS on OFW (4.70 +) consoles , but now this tool can now obtain your PS3's ID, which can have various uses, the tool has been confirmed to work on SuperSlim models by the team. . If you have not read the previous details about the PS3Xploit project, then checkout this official thread to get the firsthand information about this ambitious PS3 project.
To get it Working
***Do NOT Share your file with anyone publicly! It can be stolen and used to unban someone else's console as it's a specific console identifier, leading to yours being banned. You have been warned!***
So in short, never use the browser or set a homepage you cancel before running the exploit!
If you need to, set the homepage to 'about:blank', close the browser then reopen it to start the idps dumper.
OFW 4.81 Download: HERE
OFW 4.82 Download: HERE
Setup a small Web server on pc or smartphone. The Python http server is not required for most users, it was provided for developers. Since v0.2.3, all other extra requirements have been removed. Don't come to us for explanations about how to run a http server though. Google it.
Extract the files in your http server root folder.
Put a fat32 USB key in port closest to BD Drive (/dev_usb000) (***This is the USB Drive CLOSEST to the Optical Drive, on ALL Models***.)
Open the PS3 browser & write the IP address of your server (and the port if not 80).
Run until PS3 beeps & shutdown. The idps should be on your USB drive as idps.bin.
What if I get this ?:
Answer: Add C:\Python27\ to the end of the PATH system variable.
What if I get a "capstone" related error?:
Answer: Download capstone from HERE, get CMD pointed to the folder you extracted from capstone ("cd C:/Downloads/capstone" for example) and run the command "python setup.py install".
What if I run the exploit and nothing happens?:
Answer: Keep trying! Reboot the PS3, re-run the exploit, and keep trying. It took me almost 30 tries before it finally worked.
It Worked! But what do I do with the file?:
Nothing! As of yet! Keep this file safe, as it could be important later down the road when the rest of the exploit becomes public.
Thanks to Team PS3Xploit for putting this together! Without his work, we wouldn't have this!
Stay tuned for more information and more exploits later down the road!