![]() Another shows the PS2 running a Super Nintendo emulator (below). CTurt showed a video running a backup of Shadow of the Colossus (above). As mentioned, homebrew games and burned backups are possible. The exploit can be used for a few things. It also does not involve physically blocking the disc tray sensors. ![]() It is unique because CTurt claims it is the only exploit that does not use non-native hardware like network adapters, an HDD expansion, or a modchip. This method completely bypasses the PS2's physical disc copy protection because the system thinks it is preparing a DVD for video playback. Without going into the technical details, which you can read in his blog, CTurt created a corrupted IFO file that generates a "large read overflow." Essentially, it loads an ELF (Executable and Linkable Format) file-the type used in homebrew games-into the system's cache, which is then pushed into the main memory by the overflow.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |