

After memory has been allocated for the payload USB device on port 1, the PS3 Jailbreak then tells the PS3 that another USB device has been plugged into port 2. This device has normal device descriptors for a typical USB device. This device contains the payload that will run after the exploit is complete. After memory is allocated for the device which is the 6-port USB hub, the PS3 Jailbreak then tells the PS3 that a USB device has been plugged into port 1 of the hub. When the dongle is plugged into a PS3 (all models-"Fat" and "Slim") its device descriptors notify the PS3 that it is a 6-port USB hub.

The PS3 Jailbreak effectively exploits the PS3 by using a heap overflow. They are able to run homebrew applications on any version of Playstation 3 by exploiting some vulnerabilities in official firmware of the console.
JAILBREAKER SA PS3 INSTALL
Īs of December 2020, websites such as PSX-PLACE are still working on exploiting the vulnerabilities to install CFW on super slim consoles. On June 26, 2013, the 3.60+ loader keys were released to the public by "The Great Unicorns" and on the same day hard-drive encryption for PHAT consoles were released by a developer called "flatz." Following this the Lv1ldr crypto keys were released for 4.21-4.46. They cannot, however, be installed unless the PlayStation 3 is on system software version 3.55 or below. These custom firmware render the PlayStation Jailbreak obsolete. There are now different developers releasing CFWs for the latest versions of PlayStation 3's firmware. Shortly after, a well-known PlayStation 3 developer, "Rogero," released his free of charge 4.21 CFW. These were the same keys that would have allowed a Chinese hacking group known as "Blue Disk" to release a purchasable CFW (custom firmware) for 4.21 and above. In September 2011, Lulzsec Cody Kretsinger was arrested for attacking Sony pictures website that had previously been taken offline by a DDOS attack lasting over 2 months, Kretsinger had found and released level 0 security codes that could be used to run unauthorized firmware known as CFW ("Custom Firmware").


These flashers still work on the latest system software version and can be purchased online. It would then flash the memory off the chip and backup the PlayStation's firmware, downgrading the console when the hard-drive was formatted.
JAILBREAKER SA PS3 MODS
These hardware mods were NAND/NOR chip flashers that would either be soldered or clipped onto the PlayStation's chips on NAND/NOR chip located on the PlayStation's motherboard. In August 2011, information about hardware that was downgrading PlayStations on system software v3.70 was being released. The creators of PS3 Jailbreak also released PS Downgrade which enables downgrading of PlayStation 3's System Software to v3.41 (Or lower) from v3.42, v3.50, and v3.55.
JAILBREAKER SA PS3 MOD
Most of these only work on PlayStation 3 system software v3.41 or lower as PlayStation's System Software v3.42 patches the mod chip exploit on the console. Multiple devices to perform code execution exist, such as the open sourced versions (e.g. Backup Manager can also be used to run homebrew applications that are created to run in the console's native mode. One of the most popular pieces of homebrew software used with the device is Backup Manager, which allows users to copy game titles from the optical media to the hard drive of the PlayStation 3. It works by bypassing a system security check using a memory exploit ( heap overflow) which occurs with USB devices that allows the execution of unsigned code.
JAILBREAKER SA PS3 SERIAL
PlayStation 3 Jailbreak was the first USB (Universal Serial Bus) chipset that allowed unauthorized execution of code, similar to homebrew, on the PlayStation 3.
