看板 Modchip 關於我們 聯絡資訊
歡迎轉載 請註明轉自:WWW.PSPer.NET PSP玩家網 近日,PSP技術玩家組放出ChickHEN 破解程序反編譯代碼,有興趣研究和覺得有用的玩家 可以參考一下。 TIFF圖片中隱藏的代碼: 以下為引用的內容: # libTIFF Exploit by MaTiaZ, modified by Team Typhoon # Eggcode in TIFF, disassembled and commented # Any new information or questions: http://advancedpsp.freeforums.org -- CHICKHEN程序開始-- # I初始化 00000000: a0 <- 0x04400000 00000004: a1 <- 0x047a0000 -- 添零 -- # Fills with zeros the memory segment between (a0) and (a1) 00000008: w(a0) <- 0 0000000c: a0 <- a0 + 4 00000010: if a0 <> a1 then pc <- pc - 8 (ZERO_FILLING) # Saves in s0 current pc value, which is EGG_START + 0x20 # This is done because we don't know at which memory address # the egg is loaded, and we need to know to reference data # s0 = EGG_START + 0x20 00000018: pc <- pc + 0x8; ra <- pc + 8 00000020: s0 <- ra # a0 = (EGG_START + 0x20) + OFFSET_MODULE_NAME_WANTED = STRING_POINTER # PUNTERO CADENA points to "scePaf_Module\0" 00000024: a0 <- s0 + 0x0508 # 更多的初始化操作 # v1 and s2 looks like base segments # s3 looks like an offset # v1 = SCEPAF_MODULE_START # s2 = UNKNOWN_ADDRESS ¿? # s3 = OFFSET_MODULE_NAME 00000028: v1 <- 0x08810000 00000030: s2 <- 0x09ea0c46 00000038: s3 <- 0x0015f3ac -- 處理模塊未發現情況 -- # t0 = MODULE_NAME_POINTER # t1 = STRING_POINTER 0000003c: t0 <- v1 + s3 00000040: t1 <- a0 -- 比較字符 -- # Compares two strings, pointed by t0 and t1 # Loads t2 with first/next character from MODULE_NAME_POINTER # Loads t2 with first/next character from STRING_POINTER # t0 = MODULE_NAME_POINTER # t1 = STRING_POINTER 00000044: t2 <- b(t0) 00000048: t3 <- b(t1) 0000004c: if t2 = t3 then pc <- pc + 0xc (SAME_CHARS) # If characters are different, then it's not the module we're searching for 00000054: pc <- pc + 0x1c 00000058: v0 <- 1 (DECISION) -- 字符相同的情況-- # If we character is NULL, then we've reached the end of the string # so the strings are equal # Go to DECISION 0000005c: if t2 = 0 then pc <- pc + 14; v0 <- 0 (DECISION) # If not, compare next character 00000064: t0 <- t0 + 1 00000068: pc <- pc - 0x24 0000006c: t1 <- t1 + 1 (COMPARE_CHARS) -- DECISION -- # If v0 = 0, we found the module # If v0 = 1, we didn't found the module # v1 = SCEPAF_MODULE_START # s0 = EGG_START + 0x20 # s3 = OFFSET_MODULE_NAME # If we found it, go to MODULE_FOUND with s3 = SCEPAF_MODULE_START 00000070: if v0 = 0 then pc <- pc + 0x20; s3 <- v1 (MODULE_FOUND) # If not, SCEPAF_MODULE_START++ 00000078: v1 <- v1 + 1 0000007c: if v1 < s0 then t0 <- 1, else t0 <- 0 # If we reach the egg, go to MODULE_FOUND with s3 = 0 00000080: if t0 = 0 then pc <- pc + 0x10; s3 <- 0 (MODULE_FOUND) # If we haven't found the module, try again with v1 + 1 00000088: pc <- pc - 0x4c (MODULE_NOT_FOUND) -- 處理模塊發現的情況-- # s3 = SCEPAF_MODULE_START # Let's consider this piece of code as if the module was found # t0 = SCEPAF_MODULE_START + OFFSET_1 = DATA_POINTER_1 00000094: t0 <- 0x40138c30 00000098: t0 <- s3 + t0 # t1 = SCEPAF_MODULE_START + OFFSET_2 = DATA_POINTER_2 000000a0: t1 <- 0x000d74c0 000000a4: t1 <- s3 + t1 # Copy two words (8 bytes) from DATA_POINTER_2 to DATA_POINTER_1 000000a8: t2 <- w(t1) 000000ac: w(t0) <- t2 000000b0: t2 <- w(t1+4) 000000b4: w(t0+4) <- t2 # t0 = SCEPAF_MODULE_START + OFFSET_3 = FUNCTION_1 000000bc: t0 <- 0x0015ee90 000000c0: t0 <- s3 + t0 # Call FUNCTION_1(1) 000000c4: ra <- pc + 8; pc <- t0 000000c8: a0 <- 1 # Kernel_Library_5F10D406 # sceKernelCpuResumeIntr # Resume interruptions # Ignores FUNCTION_1() return value # t0 = SCEPAF_MODULE_START + OFFSET_4 = FUNCTION_2 000000d0: t0 <- 0x0015ee70 000000d4: t0 <- t0 + s3 # a0 = (EGG_START + 0x20) + OFFSET_RUTA_H.BIN = PATH_POINTER # PATH_POINTER points to "ms0:/h.bin\0" 000000d8: a0 <- s0 + 0x4f8 000000dc: a1 <- 0x00000801 000000e0: ra <- pc + 8; pc <- t0 000000e4: a2 <- 0x000001ff # Call FUNCTION_2(PATH_POINTER,0x0801,0x01ff) # I suppose FUNCTION_2 is fopen() (sceIoOpen) # IoFileMgrForUser_109F50BC # sceIoOpen # FUNCTION_2() returns file descriptor # v0 = FILE_DESCRIPTOR # t0 = SCEPAF_MODULE_START + OFFSET_5 = FUNCTION_3 000000ec: t0 <- 0x0015ee58 000000f0: t0 <- t0 + s3 # Pass FILE_DESCRIPTOR to FUNCTION_3 # a0,s2 = FILE_DESCRIPTOR 000000f4: s2 <- v0 000000f8: a0 <- s2 # Looks like number of bytes to copy: 65 KB # a2 = NUMBER_BYTES 000000fc: a2 <- 0x00010000 00000100: ra <- pc + 8; pc <- t0 # Looks like destination buffer # a1 = DIRECCION_BUFFER # Bit 30 = 1 -> real address: 0x08800000 uncached 00000104: a1 <- 0x48800000 # FUNCTION_3(FILE_DESCRIPTOR,DIRECCION_BUFFER,NUMBER_BYTES) # I suppose FUNCTION_3 is read() (sceIoRead) # IoFileMgrForUser_6A638D83 # sceIoRead # Ignoring FUNCTION_3() return value # t0 = SCEPAF_MODULE_START + OFFSET_6 = FUNCTION_4 0000010c: t0 <- 0x0015ee60 00000110: t0 <- s3 + t0 00000114: ra <- pc + 8; pc <- t0 00000118: a0 <- s2 # FUNCTION_4(FILE_DESCRIPTOR) # IoFileMgrForUser_810C4BC3 # sceIoClose 0000011c: pc <- 0x08800000 00000120: a0 <- s3 # Jump to loaded code # Passing it SCEPAF_MODULE_START in a0 -- 進入戰國時代..?? http://www.psper.net/psp/M33/05232FZ2009.html -- ※ 發信站: 批踢踢實業坊(ptt.cc) ◆ From: 114.47.223.27
angusyu:哪國語言.. -_- 05/24 01:18
phylliss:戰國時代… 05/24 01:27
biblecross:只有學過8學分的程式設計看這個有點困難 05/24 01:37
linmondi:有看沒有懂~有請高手幫忙一下 05/24 01:48
Splash5:一般人不用看懂這個.. 當然這對有心踏入的人很有幫助 05/24 02:06
Splash5:老手應該不會等這份文件出來才去trace.. XDD.. 05/24 02:07
Splash5:戰國時代? 我只能說 有心要作的人早作了 大多人還是 05/24 02:08
Splash5:都等現成的居多 :ppp 05/24 02:08
kovenkoven:剛好在修系統程式XD 05/24 02:12
Splash5:給有心入門的人.. 白算盤拿出來看多少有點幫助XDD 05/24 02:13
Splash5:MIPS組語跟cpu架構弄熟 再去網路上找psp硬體架構 05/24 02:14
clarklove:雖然我組語有pass,可是也看得超辛苦= = 05/24 03:25
Modchip:嗯,果然畢業十年真的會看不懂XD 05/24 04:21
supermousess:這在完全沒學過的人眼中看來完全是火星文 05/24 06:25
menspower:ps2dev網站也有不少資料...還有toolchain可用:P 05/24 09:07
menspower:意思應該是說有人把ChickHEN的Binary code反組譯成... 05/24 09:10
menspower:MIPS assembly code(因為PSP的CPU是MIPS...) 05/24 09:11
menspower:如果有高手有興趣要作什麼的話...可以參考這段code... 05/24 09:12
menspower:因為人類(Programmer)沒辦法直接看binary code做事... 05/24 09:15
menspower:尼歐除外:P (The Matrix) 05/24 09:17
Eior:突然覺得 我計組跟組語還算是沒有白修.... 05/24 10:20
jonas:CHICKEN CHICKEN CHICKEN...... 05/24 10:56
htstj:哈哈哈哈!!!!樓上大笑!好懷念的seminar!!! 05/24 11:06
final01:有沒有英文版的論壇阿 都看不懂~它在說明啥 05/24 11:59
final01:XD 搞錯原來它論壇也有英文版 05/24 12:02
ILoveHer:po code在這邊 有什麼意義嗎 如果是新聞 就po link吧 05/24 17:50
fly9588:覺得有意義的就覺得有意義吧,覺得沒意義的就...? 05/24 18:01
final01:H.bin的asm也可po一下吧 xd 05/24 19:21
littlecut:我只看的董部份〒△〒 05/25 15:07