{"id":223,"date":"2010-08-10T02:26:26","date_gmt":"2010-08-09T17:26:26","guid":{"rendered":"http:\/\/gamegaz.jp\/blog\/?p=223"},"modified":"2010-08-12T00:04:05","modified_gmt":"2010-08-11T15:04:05","slug":"%e8%bb%bd%e3%81%84exploit%e7%99%ba%e8%a6%8b%e3%80%81hello-world%e3%83%81%e3%83%a5%e3%83%bc%e3%83%88%e3%83%aa%e3%82%a2%e3%83%ab%e3%81%ae%e6%98%af%e9%9d%9e","status":"publish","type":"post","link":"https:\/\/gamegaz.jp\/blog\/2010\/08\/10\/223","title":{"rendered":"&#8220;\u8efd\u3044&#8221;exploit\u767a\u898b\u3001Hello World\u30c1\u30e5\u30fc\u30c8\u30ea\u30a2\u30eb\u306e\u662f\u975e"},"content":{"rendered":"<p>Lan.st\u30d5\u30a9\u30fc\u30e9\u30e0\u3067\u3001<a href=\"http:\/\/lan.st\/showthread.php?t=3095\">Exploits: How to find them in their various forms? <\/a> (Exploit\u3092\u3044\u308d\u3093\u306a\u30d1\u30bf\u30fc\u30f3\u3067\u898b\u3064\u3051\u308b\u306b\u306f\uff1f)\u3068\u3044\u3046\u30c8\u30d4\u30c3\u30af\u304c\u8a71\u984c\u306b\u306a\u3063\u3066\u3044\u308b\u3088\u3046\u3067\u3059\u3002\u5b9f\u969b\u306b\u306fexploit\u3092\u898b\u3064\u3051\u308b\u65b9\u6cd5\u3092\u5b89\u6613\u306b\u805e\u3044\u305f\u3088\u3046\u306a\u8cea\u554f\u5185\u5bb9\u306f\u7d50\u679c\u7684\u306b\u8457\u540d\u306aPSP\u30cf\u30c3\u30ab\u30fc\u9054\u306e\u3001exploit\u3092\u767a\u898b\u3057\u3066\u305d\u306e\u4e8b\u5b9f\u3060\u3051\u3092\u767a\u8868\u3059\u308b\u4eca\u306e\u98a8\u6f6e\u306b\u3064\u3044\u3066\u306e\u8b70\u8ad6\u3092\u5f15\u304d\u51fa\u3057\u307e\u3057\u305f\u3002\u30c4\u30a4\u30c3\u30bf\u30fc\u3067\u30ea\u30af\u30a8\u30b9\u30c8\u3092\u3082\u3089\u3044\u307e\u3057\u305f\u306e\u3067\u3001\u3053\u306e\u554f\u984c\u306b\u3064\u3044\u3066\u8457\u540d\u306a\u30cf\u30c3\u30ab\u30fc\u3055\u3093\u9054\u306e\u610f\u898b\u3092\u4ea4\u3048\u306a\u304c\u3089\u8003\u3048\u3066\u307f\u305f\u3044\u3068\u601d\u3044\u307e\u3059\u3002<\/p>\n<p style=\"text-align: center;\"><a class=\"\" rel=\"\" title=\"exploit\" href=\"http:\/\/farm5.static.flickr.com\/4094\/4875480607_f51fc27f51.jpg\"><img decoding=\"async\" class=\"alignnone\" src=\"http:\/\/farm5.static.flickr.com\/4094\/4875480607_f51fc27f51.jpg\" border=0 alt=\"exploit\"><\/a><\/p>\n<p><!--more--><br \/>\n\u3053\u306e\u30c8\u30d4\u30c3\u30af\u306fSide Scoop\u6c0f\u306e\u4ee5\u4e0b\u306e\u8cea\u554f\u304b\u3089\u59cb\u307e\u308a\u307e\u3057\u305f\u3002<\/p>\n<blockquote><p><strong>Side Scoop<\/strong><br \/>\nHow would I go about finding exploits? How many kinds of exploits are there? And most of all, how would I go about finding them? How would I provide them to the community if I find one (or two)?<br \/>\n<font color=\"#ff0000\">exoloit\u3092\u767a\u898b\u3059\u308b\u306b\u306f\u3069\u3046\u3057\u305f\u3089\u826f\u3044\u306e\u3067\u3057\u3087\u3046\u3002exploit\u306f\u4f55\u7a2e\u985e\u898b\u3064\u304b\u3063\u3066\u3044\u308b\u3093\u3067\u3059\u304b\uff1f\u898b\u3064\u3051\u308b\u306b\u306f\u3069\u3046\u3059\u308c\u3070\u3044\u3044\u306e\u3067\u3057\u3087\u3046\u304b\u3002\u898b\u3064\u3051\u305f\u3089\u30b3\u30df\u30e5\u30cb\u30c6\u30a3\u306e\u7686\u3055\u3093\u3078\u4f1d\u3048\u308b\u306b\u306f\u3069\u3046\u3057\u305f\u3089\u3044\u3044\u306e\u3067\u3057\u3087\u3046\u304b?<\/font><\/p><\/blockquote>\n<p>\u4e0a\u306e\u3088\u3046\u306a\u8cea\u554f\u306b\u771f\u9762\u76ee\u306b\u7b54\u3048\u308b\u6c17\u304c\u306a\u304f\u306a\u308b\u30cf\u30c3\u30ab\u30fc\u3055\u3093\u9054\u306e\u6c17\u6301\u3061\u3082\u5206\u304b\u308a\u307e\u3059\u3002\u305d\u308c\u306f\u305d\u308c\u3067\u7f6e\u3044\u3066\u304a\u304f\u3068\u3057\u3066\u3001\u79c1\u306b\u3068\u3063\u3066\u4eca\u6c17\u306b\u306a\u3063\u3066\u3044\u308b\u3053\u3068\u306f\u3001\u767a\u898b\u3059\u308b\u306b\u306f\u3069\u3046\u3057\u305f\u3089\u826f\u3044\u304b\u3001\u3067\u306f\u306a\u304f\u767a\u898b\u3057\u305f\u3089\u3069\u3046\u3057\u305f\u3089\u826f\u3044\u304b\u3001\u3067\u3059\u3002<\/p>\n<p>\u65e5\u672c\u3067\u3082\u73fe\u5728\u8907\u6570\u306eexploit\u304c\u898b\u3064\u304b\u3063\u3066\u3044\u307e\u3059\u3002<br \/>\n\u3053\u308c\u3060\u3051\u306e\u6570\u306eexploit\u304c\u77ed\u671f\u9593\u306b\u898b\u3064\u304b\u3063\u305f\u4f8b\u306f\u904e\u53bb\u306b\u306f\u3042\u308a\u307e\u305b\u3093\u3002\u4f55\u6545\u6700\u8fd1\u306b\u306a\u3063\u3066exploit\u306e\u6570\u304c\u5897\u3048\u305f\u306e\u304b\u306e\u7406\u7531\u306f\u660e\u767d\u3067\u3001wololo\u6c0f\u306e\u30bb\u30fc\u30d6\u30c7\u30fc\u30bf\u3092\u5229\u7528\u3057\u305f\u30e6\u30fc\u30b6\u30fc\u30e2\u30fc\u30c9exploit\u3092\u5229\u7528\u3057\u305f<a href=\"http:\/\/wololo.net\/wagic\/2010\/02\/27\/writing-a-binary-loader\/\">Hello World\u5b9f\u884c\u307e\u3067\u306e\u30c1\u30e5\u30fc\u30c8\u30ea\u30a2\u30eb<\/a>(\u3068\u3001\u305d\u308c\u3092\u7ffb\u8a33\u3057\u3066\u7d39\u4ecb\u3057\u305f<a href=\"http:\/\/plaza.rakuten.co.jp\/mamosuke2008\/diary\/201003050001\/\">\u5927\u4eba\u306e\u305f\u3081\u306e\u30b2\u30fc\u30e0\u8b1b\u5ea7\u306e\u8a18\u4e8b<\/a>)\u306b\u3088\u308a\u30cf\u30fc\u30c9\u30eb\u304c\u4e0b\u304c\u3063\u305f\u3053\u3068\u306b\u4ed6\u306a\u308a\u307e\u305b\u3093\u3002<\/p>\n<p>\u79c1\u306f\u5b9f\u306f\u4eca\u5f8c\u3069\u3046\u3059\u3079\u304d\u306a\u306e\u304b\u601d\u6848\u4e2d\u3067\u3059\u3002\u3082\u3061\u308d\u3093Hello World(\u4efb\u610f\u306e\u81ea\u4f5c\u30b3\u30fc\u30c9\u304c\u5b9f\u884c\u53ef\u80fd\u3067\u3042\u308b\u3053\u3068\u3092\u5b9f\u8a3c\u3059\u308b\u305f\u3081\u306e\u30d7\u30ed\u30b0\u30e9\u30e0\u306e\u3053\u3068\u3002\u305d\u306e\u305f\u3081\u30d0\u30a4\u30ca\u30ea\u30c7\u30fc\u30bf\u3092\u8aad\u307f\u8fbc\u3093\u3067\u5b9f\u884c\u3057\u753b\u9762\u306b&#8221;Hello World&#8221;\u3068\u8868\u793a\u3059\u308b\u30d7\u30ed\u30b0\u30e9\u30e0\u3092\u4e00\u822c\u7684\u306bHello World\u3068\u547c\u3093\u3067\u3044\u307e\u3059)\u306e\u3088\u3046\u306a\u30d0\u30a4\u30ca\u30ea\u30ed\u30fc\u30c0\u30fc\u306e\u72b6\u614b\u3067\u30ea\u30ea\u30fc\u30b9\u3057\u3066\u3082\u306a\u3093\u306e\u610f\u5473\u3082\u306a\u3044\u3053\u3068\u306f\u5f53\u7136\u7406\u89e3\u3057\u3066\u3044\u307e\u3059\u3002Hello World\u306f\u30a2\u30bb\u30f3\u30d6\u30e9\u3067\u4f5c\u6210\u3057\u305f\u30d7\u30ed\u30b0\u30e9\u30e0\u306a\u3089\u5b9f\u884c\u3067\u304d\u308b\u3001\u307e\u305f\u306f\u4e00\u822c\u7684\u306aPSP\u306eHomebrew\u306e\u30d5\u30a1\u30a4\u30eb\u5f62\u5f0f\u3067\u3042\u308bEBOOT.PBP\u3067\u306f\u306a\u304f\u5c02\u7528\u306eSDK\u3092\u5229\u7528\u3057\u3066\u30b3\u30f3\u30d1\u30a4\u30eb\u3057\u305f\u30d0\u30a4\u30ca\u30ea\u30d5\u30a1\u30a4\u30eb\u306a\u3089\u5b9f\u884c\u3067\u304d\u308b\u3068\u3044\u3046\u3053\u3068\u3092\u5358\u306b\u8a3c\u660e\u3057\u305f\u306b\u904e\u304e\u305a\u3001\u5b9f\u7528\u6027\u306b\u6b20\u3051\u3066\u3044\u307e\u3059\u3002\u3053\u308c\u304cHello World\u3060\u3051\u3067\u306f\u610f\u5473\u304c\u306a\u3044\u3068\u8a00\u308f\u308c\u3066\u3044\u308b\u7406\u7531\u3067\u3059\u3002<br \/>\n\u8457\u540d\u306aPSP\u30cf\u30c3\u30ab\u30fc\u306e\u7686\u3055\u3093\u306f\u3069\u3046\u8003\u3048\u3066\u3044\u308b\u306e\u304b\u3001\u30d5\u30a9\u30fc\u30e9\u30e0\u306b\u6295\u7a3f\u3055\u308c\u305f\u610f\u898b\u3092\u30d4\u30c3\u30af\u30a2\u30c3\u30d7\u3057\u3066\u307f\u307e\u3059\u3002\u6642\u7cfb\u5217\u306b\u767a\u8a00\u3092\u4e26\u3079\u3066\u3042\u308a\u307e\u3059\u3002\u3059\u3079\u3066\u7ffb\u8a33\u3059\u308b\u306e\u3082\u5927\u5909\u3067\u3059\u306e\u3067\u30dd\u30a4\u30f3\u30c8\u3068\u306a\u308b\u90e8\u5206\u3060\u3051\u629c\u304d\u51fa\u3057\u3001\u8a71\u306e\u6d41\u308c\u306b\u6cbf\u3063\u3066\u7ffb\u8a33\u3057\u3066\u3042\u308a\u307e\u3059\u306e\u3067\u5b9f\u969b\u306e\u82f1\u6587\u3068\u7ffb\u8a33\u304c\u4e00\u90e8\u7570\u306a\u308b\u3068\u3053\u308d\u304c\u3042\u308a\u307e\u3059\u3002\u3054\u4e86\u627f\u304f\u3060\u3055\u3044\u3002<\/p>\n<blockquote><p><strong>Davee<\/strong><br \/>\nThose are great and all, but honestly, before jumping into anything specific you need understand the concepts of a computer system. It&#8217;s not &#8220;essential&#8221; but in the long run you&#8217;ll benefit greater from it. That way, you will not learn how to exploit but you&#8217;ll learn how a processor handles certain situations or performs in certain manner which can reveal design flaws. For example, studying computer architecture will help you understand pipelining and why it can hinder important patches to a system, same with cache lines when they become &#8220;dirty&#8221;.<br \/>\n<font color=\"#ff0000\">\u6b63\u76f4\u306a\u3068\u3053\u308d\u3001\u7279\u6b8a\u9818\u57df\u306b\u8e0f\u307f\u8fbc\u3080\u524d\u306b\u30b3\u30f3\u30d4\u30e5\u30fc\u30bf\u30b7\u30b9\u30c6\u30e0\u306e\u77e5\u8b58\u3092\u5f97\u3066\u304a\u304f\u3079\u304d\u3067\u3057\u3087\u3002\u672c\u8cea\u7684\u306a\u554f\u984c\u3067\u306f\u306a\u3044\u3051\u3069\u9577\u3044\u76ee\u3067\u898b\u308c\u3070\u305d\u306e\u65b9\u304c\u7d76\u5bfe\u3044\u3044\u3088\u3002\u30b3\u30f3\u30d4\u30e5\u30fc\u30bf\u306e\u4ed5\u7d44\u307f\u3092\u52c9\u5f37\u3057\u3066\u304a\u3051\u3070\u30d1\u30a4\u30d7\u30e9\u30a4\u30f3\u3060\u3068\u304b\u304c\u826f\u304f\u5206\u304b\u308b\u3057\u3001\u6ec5\u8336\u82e6\u8336\u306b\u306a\u3063\u305f\u6642\u306b\u30b7\u30b9\u30c6\u30e0\u3078\u306e\u5927\u4e8b\u306a\u30d1\u30c3\u30c1\u3068\u304b\u30ad\u30e3\u30c3\u30b7\u30e5\u30e9\u30a4\u30f3\u3068\u304b\u304c\u306a\u3093\u3067\u90aa\u9b54\u3055\u308c\u308b\u306e\u304b\u304c\u5206\u304b\u308b\u3057\u3002<\/font><\/p>\n<p>The list goes on to parallelism, to exception handling, to memory management and even to a generic boot-process. This knowledge, is the key to exploiting IMO. A lot of people use wololo&#8217;s excellent resource for finding exploits in games, HOWEVER, most of them only blindly follow a tutorial not understanding ANYTHING about the behind operation and of course, they only look for the type of exploit they are shown.<br \/>\n<font color=\"#ff0000\">\u30e1\u30e2\u30ea\u7ba1\u7406\u3068\u304b\u30d6\u30fc\u30c8\u30d7\u30ed\u30bb\u30b9\u3068\u304b\u306e\u77e5\u8b58\u306fexploit\u898b\u3064\u3051\u3066\u3044\u304f\u4e0a\u3067\u306f\u5927\u4e8b\u306a\u30dd\u30a4\u30f3\u30c8\u3067\u3057\u3087\u3002\u3067\u3082\u5b9f\u969b\u307b\u3068\u3093\u3069\u306e\u4eba\u304c\u30c1\u30e5\u30fc\u30c8\u30ea\u30a2\u30eb\u306b\u6cbf\u3063\u3066\u306a\u3093\u306b\u3082\u7406\u89e3\u305b\u305a\u3084\u3063\u3066\u308b\u304b\u3089\u3042\u308b\u7a2e\u985e\u306eexploit\u3070\u3063\u304b\u3002<\/font><\/p><\/blockquote>\n<p>\u305d\u308c\u306f\u305d\u306e\u901a\u308a\u3067\u3059\u3002\u305f\u3060\u6700\u521d\u306b\u305d\u3053\u307e\u3067\u306e\u77e5\u8b58\u304c\u5fc5\u305a\u5fc5\u8981\u304b\u3069\u3046\u304b\u306b\u3064\u3044\u3066\u306f\u500b\u4eba\u7684\u306b\u306f\u7591\u554f\u3092\u5448\u3057\u307e\u3059\u3002\u9d8f\u304c\u5148\u304b\u5375\u304c\u5148\u304b\u306e\u7406\u8ad6\u3060\u3068\u601d\u3044\u307e\u3059\u3002\u5927\u5207\u306a\u306e\u306f\u9d8f\u306e\u30e9\u30a4\u30d5\u30b5\u30a4\u30af\u30eb\u304c\u7e70\u308a\u8fd4\u3055\u308c\u308b\u3053\u3068\u3067\u3042\u308a\u3001\u9806\u756a\u3092\u6c7a\u3081\u3066\u305d\u306e\u9806\u756a\u901a\u308a\u306b\u884c\u3046\u4e8b\u3060\u3051\u304c\u6b63\u3057\u3044\u9053\u3060\u3068\u306f\u601d\u3044\u307e\u305b\u3093\u3002<br \/>\n\u4f55\u3082\u7406\u89e3\u3057\u306a\u3044\u3067\u3001\u3068\u3044\u3046\u90e8\u5206\u306f\u78ba\u304b\u306b\u3042\u308b\u3068\u306f\u601d\u3044\u307e\u3059\u3002\u3057\u304b\u3057\u65e5\u672c\u3067\u306f\u4eca\u307e\u3067PSP\u306e\u30e6\u30fc\u30b6\u30fc\u306f\u3044\u307e\u3057\u305f\u304cPSP\u306e\u30cf\u30c3\u30ab\u30fc\u3068\u547c\u3070\u308c\u308b\u4eba\u306f\u6975\u5c11\u6570\u3067\u3057\u305f\u3002\u521d\u3081\u3066PSP\u306e\u30cf\u30c3\u30ad\u30f3\u30b0\u306b\u53d6\u308a\u7d44\u3080\u4eba\u306f\u30c1\u30e5\u30fc\u30c8\u30ea\u30a2\u30eb\u306b\u6cbf\u3063\u3066\u9032\u3081\u308b\u9014\u4e2d\u7d4c\u904e\u306b\u304a\u3044\u3066\u306f\u7406\u89e3\u5ea6\u306b\u4e0d\u8db3\u3092\u751f\u3058\u308b\u3053\u3068\u306f\u5426\u3081\u307e\u305b\u3093\u304c\u3001Davee\u6c0f\u306e\u610f\u898b\u306f\u305d\u3053\u304b\u3089\u30b9\u30bf\u30fc\u30c8\u3057\u3066\u6210\u9577\u3057\u3066\u3044\u304f\u53ef\u80fd\u6027\u3092\u5426\u5b9a\u3059\u308b\u4e00\u65b9\u7684\u306a\u610f\u898b\u3067\u3059\u3002\u7d50\u679c\u3068\u3057\u3066\u30cf\u30c3\u30ab\u30fc\u304c\u5897\u3048\u3066\u304f\u308b\u3068\u3044\u3046\u30d7\u30e9\u30b9\u4f5c\u7528\u3092\u5f15\u304d\u8d77\u3053\u3059\u304b\u3082\u77e5\u308c\u307e\u305b\u3093\u3002<\/p>\n<blockquote><p><strong>Jachra<\/strong><br \/>\nTo learn to find exploits in the kernel, you need to understand C\/C++-programming.<br \/>\n<font color=\"#ff0000\">\u30ab\u30fc\u30cd\u30eb\u30e2\u30fc\u30c9exploit\u306e\u898b\u3064\u3051\u65b9\u3092\u77e5\u308d\u3046\u3068\u601d\u3063\u305f\u3089\u3001C\u3084C++\u306e\u30d7\u30ed\u30b0\u30e9\u30df\u30f3\u30b0\u3067\u304d\u306a\u304d\u3083\u306d\u3002<\/font><\/p><\/blockquote>\n<p>\u898b\u3064\u3051\u308b\u306e\u306bC\u3084C++\u3068\u3044\u3063\u305f\u30d7\u30ed\u30b0\u30e9\u30e0\u8a00\u8a9e\u306e\u77e5\u8b58\u304c\u5fc5\u305a\u5fc5\u8981\u304b\u3068\u8a00\u308f\u308c\u308c\u3070\u7b54\u3048\u306f\u30ce\u30fc\u3067\u3059\u304c\u3001\u898b\u3064\u3051\u305f\u5f8c\u306b\u306f\u5fc5\u8981\u3067\u3057\u3087\u3046\u3002<\/p>\n<blockquote><p><strong>Davee<\/strong><br \/>\nyou don&#8217;t need to understand C\/C++ to find exploits in the kernel.<br \/>\nlooking for an exploit in C code can be more challenging than looking at the raw assembler&#8230;<br \/>\n<font color=\"#ff0000\">\u3044\u3084\u3001\u30ab\u30fc\u30cd\u30eb\u30e2\u30fc\u30c9exploit\u306fC\u3068\u304bC++\u3058\u3083\u306a\u3044\u3088\u3002C\u3067exploit\u898b\u3064\u3051\u308b\u306e\u306f\u30a2\u30bb\u30f3\u30d6\u30e9\u3067\u3084\u308b\u3088\u308a\u30cf\u30fc\u30c9\u30eb\u9ad8\u3044\u3067\u3057\u3087\u3002<\/font><\/p><\/blockquote>\n<p>\u30a2\u30bb\u30f3\u30d6\u30e9\u306f\u77e5\u3063\u3066\u3044\u308b\u306b\u8d8a\u3057\u305f\u3053\u3068\u3042\u308a\u307e\u305b\u3093\u3002sparta_sdK\u306eloader.s\u306f\u30a2\u30bb\u30f3\u30d6\u30e9\u3067\u3059\u304b\u3089\u3002\u3057\u304b\u3057\u3001\u30d7\u30ed\u30b0\u30e9\u30df\u30f3\u30b0\u3068\u3044\u3046\u306e\u306f\u300c\u7fd2\u3046\u3088\u308a\u6163\u308c\u308d\u300d\u3002sparta_sdk\u3092\u6559\u6750\u306b\u3059\u308b\u3053\u3068\u306f\u9593\u9055\u3063\u305f\u5b66\u7fd2\u65b9\u6cd5\u3067\u306f\u3042\u308a\u307e\u305b\u3093\u3002<\/p>\n<blockquote><p><strong>Bubbletune<\/strong><br \/>\nfinding exploits in C code is often more of a challenge than finding them in assembly.<br \/>\nPersonally, I strongly discourage anyone to give to much information on finding them, because you should have a look at what happened when such a thing was provided for user exploits. They&#8217;re being wasted like candy by people with no programming experience, and no good will come from it.<br \/>\nIf you really have experience with reversing and programming for the PSP, you should be able to figure out how to do kernel exploitation, just like everyone I know (myself included) has.<br \/>\nIf you find a kernel exploit, make sure you&#8217;re able to work it out to something like a HEN personally before publishing information on it, rather than throwing it out for fame and see nothing be done with it.<br \/>\nSony has gone mad fixing those and I highly doubt there are any left. The only way you&#8217;ll find an exploit is actually reading the code and interpreting exactly what it&#8217;s doing, then seeing if you can get it to do what you want by feeding it certain arguments.<br \/>\n<font color=\"#ff0000\">C\u3067exploit\u3063\u3066\u30a2\u30bb\u30f3\u30d6\u30e9\u3067\u3084\u308b\u3088\u308a\u30cf\u30fc\u30c9\u30eb\u9ad8\u3044\u3088\u3002\u500b\u4eba\u7684\u306b\u306fexploit\u306e\u898b\u3064\u3051\u65b9\u3092\u8ab0\u306b\u3067\u3082\u308f\u304b\u308b\u3088\u3046\u306b\u3057\u3061\u3083\u3046\u3053\u3068\u306b\u306f\u8cdb\u6210\u3067\u304d\u306a\u3044\u306a\u3002\u672c\u5f53\u306f\u30e6\u30fc\u30b6\u30fc\u30e2\u30fc\u30c9exploit\u3067\u3082\u4f55\u304c\u8d77\u3053\u3063\u3066\u308b\u306e\u304b\u306f\u628a\u63e1\u3057\u3066\u304a\u304b\u306a\u304d\u3083\u3044\u3051\u306a\u3044\u308f\u3051\u3060\u3057\u3002\u30d7\u30ed\u30b0\u30e9\u30df\u30f3\u30b0\u7d4c\u9a13\u30bc\u30ed\u3067\u3084\u3089\u308c\u3061\u3083\u3046\u306e\u306f\u7121\u99c4\u306b\u71c3\u6599\u6d88\u8cbb\u3057\u3066\u308b\u307f\u305f\u3044\u306a\u3082\u306e\u3067\u4f55\u306e\u610f\u5473\u3082\u306a\u3044\u3002<br \/>\nPSP\u306e\u89e3\u6790\u3084\u30d7\u30ed\u30b0\u30e9\u30df\u30f3\u30b0\u306e\u7d4c\u9a13\u304c\u672c\u5f53\u306b\u3042\u308b\u306a\u3089\u30ab\u30fc\u30cd\u30eb\u30e2\u30fc\u30c9exploit\u898b\u3064\u3051\u308b\u306b\u306f\u3069\u3046\u3059\u308c\u3070\u3044\u3044\u306e\u304b\u306a\u3093\u3066\u5206\u304b\u308b\u306f\u305a\u3060\u3057\u3055\u3002\u81ea\u5206\u542b\u3081\u3066\u50d5\u304c\u77e5\u3063\u3066\u308b\u30cf\u30c3\u30ab\u30fc\u306f\u307f\u3093\u306a\u305d\u3046\u3060\u3088\u3002<br \/>\n\u3082\u3057\u30ab\u30fc\u30cd\u30eb\u30e2\u30fc\u30c9exploit\u898b\u3064\u3051\u305f\u3089\u898b\u3064\u3051\u305f\u3053\u3068\u81ea\u4f53\u3092\u516c\u958b\u3059\u308b\u524d\u306bHEN\u306a\u308a\u4f55\u306a\u308a\u7d76\u5bfe\u4f5c\u308c\u308b\u3067\u3057\u3087\u3002\u7d50\u679c\u3082\u306a\u3044\u306e\u306b\u540d\u8a89\u3060\u3051\u3042\u3063\u305f\u3063\u3066\u3057\u3087\u3046\u304c\u306a\u3044\u3002<br \/>\n\u30bd\u30cb\u30fc\u306f\u5fc5\u6b7b\u306b\u5bfe\u7b56\u3057\u3066\u304d\u305f\u308f\u3051\u3060\u3057\u3001\u73fe\u6642\u70b9\u3067\u30ab\u30fc\u30cd\u30eb\u30e2\u30fc\u30c9exploit\u304c\u6b8b\u3063\u3066\u308b\u3068\u306f\u601d\u3063\u3066\u306a\u3044\u3088\u3002exploit\u3092\u767a\u898b\u3059\u308b\u3068\u3044\u3046\u3053\u3068\u306f\u30b3\u30fc\u30c9\u304c\u7406\u89e3\u3067\u304d\u3066\u4f55\u304c\u3069\u3046\u306a\u3063\u3066\u3044\u308b\u306e\u304b\u3092\u304d\u3061\u3093\u3068\u628a\u63e1\u3067\u304d\u308b\u3053\u3068\u3067\u3057\u3087\u3046\u3002\u898b\u3064\u3051\u305f\u3089\u304d\u3061\u3093\u3068\u8b70\u8ad6\u3057\u3066\u305d\u306e\u5f8c\u306e\u65b9\u91dd\u3092\u6c7a\u3081\u3066\u3044\u304f\u3079\u304d\u3060\u3068\u601d\u3046\u3002<\/font><\/p><\/blockquote>\n<p>\u30c1\u30e5\u30fc\u30c8\u30ea\u30a2\u30eb\u306b\u6cbf\u3063\u3066\u5b9f\u884c\u3059\u308c\u3070\u8ab0\u3067\u3082Hello World\u304c\u4f5c\u308c\u308b\u307b\u3069\u7c21\u5358\u306a\u30c1\u30e5\u30fc\u30c8\u30ea\u30a2\u30eb\u3060\u3068\u306f\u601d\u3044\u307e\u305b\u3093\u3002\u73fe\u306b\u30af\u30e9\u30c3\u30b7\u30e5\u3057\u305f\u3060\u3051\u3067exploit\u3060\u3068\u547c\u3093\u3067\u516c\u958b\u3059\u308b\u4eba\u3082\u3044\u307e\u3057\u305f\u3057\u3001PSPLink\u306e\u30b9\u30af\u30ea\u30fc\u30f3\u30b7\u30e7\u30c3\u30c8\u3060\u3051\u8cbc\u3063\u3066\u300c\u3053\u308c\u306fexploit\u306b\u306a\u308a\u307e\u3059\u304b\uff1f\u300d\u3068\u3044\u3063\u305f\u8cea\u554f\u3082\u826f\u304f\u898b\u304b\u3051\u307e\u3059\u3002\u30c1\u30e5\u30fc\u30c8\u30ea\u30a2\u30eb\u306b\u306f\u66f8\u3044\u3066\u3044\u306a\u3044\u90e8\u5206\u304c\u7406\u89e3\u3067\u304d\u3066\u3044\u306a\u3044\u3001\u3064\u307e\u308a\u30c1\u30e5\u30fc\u30c8\u30ea\u30a2\u30eb\u306e\u524d\u6bb5\u968e\u3067\u3064\u307e\u305a\u3044\u3066\u3044\u308b\u4eba\u3082\u6570\u591a\u304f\u3044\u308b\u308f\u3051\u3067\u3059\u3002Hello World\u4f5c\u6210\u306f\u30b9\u30dd\u30fc\u30c4\u3068\u540c\u3058\u3067\u3001\u9053\u5177\u3060\u3051\u63c3\u3048\u3066\u3082\u8ab0\u3082\u304c\u4e00\u6d41\u30d7\u30ec\u30a4\u30e4\u30fc\u3068\u540c\u7b49\u306e\u30d7\u30ec\u30a4\u304c\u3067\u304d\u306a\u3044\u306e\u3068\u540c\u3058\u3067\u7c21\u5358\u306a\u3053\u3068\u3067\u306f\u3042\u308a\u307e\u305b\u3093\u3002\u305f\u3060\u3057\u305d\u306e\u697d\u3057\u3055\u3092\u57a3\u9593\u898b\u308b\u3053\u3068\u306f\u3067\u304d\u307e\u3059\u306e\u3067\u672c\u6c17\u3067\u53d6\u308a\u7d44\u3080\u304d\u3063\u304b\u3051\u306b\u306f\u306a\u308b\u3067\u3057\u3087\u3046\u3002\u5c11\u306a\u304f\u3068\u3082Hello World\u306b\u6210\u529f\u3057\u305f\u4eba\u305f\u3061\u306f\u30b3\u30f3\u30d1\u30a4\u30eb\u74b0\u5883\u307e\u3067\u306f\u6301\u3063\u3066\u3044\u308b\u30cf\u30c3\u30ab\u30fc\u4e88\u5099\u8ecd\u306a\u306e\u3067\u3059\u3002\u6570\u5e74\u5148\u3092\u898b\u8d8a\u3057\u305f\u53d6\u308a\u7d44\u307f\u3092\u5426\u5b9a\u3059\u308b\u4eba\u305f\u3061\u306b\u7dda\u8def\u3092\u6577\u3044\u3066\u3082\u3089\u3044\u3001\u6570\u5e74\u5f8c\u306b\u305d\u306e\u4e0a\u3092\u8d70\u308b\u6a29\u5229\u3092\u6211\u3005\u306f\u6301\u3064\u3079\u304f\u52aa\u529b\u3057\u307e\u3057\u3087\u3046\u3002\u5f8c\u7d99\u8005\u3092\u4f5c\u308b\u3053\u3068\u306f\u5148\u4eba\u306e\u7fa9\u52d9\u3060\u3068\u601d\u3044\u307e\u3059\u304c\u3001\u305d\u306e\u7fa9\u52d9\u3092\u653e\u68c4\u3057\u72ec\u5b66\u3067\u8fbf\u308a\u7740\u3051\u3068\u547d\u3058\u308b\u306e\u306f\u4e00\u5b50\u76f8\u4f1d\u306e\u8077\u4eba\u6280\u3060\u3051\u306b\u3057\u3066\u304f\u3060\u3055\u3044\u3002PSP\u306e\u30cf\u30c3\u30ad\u30f3\u30b0\u306f\u8077\u4eba\u6280\u3067\u306f\u3042\u308a\u307e\u305b\u3093\u3002\u305f\u3060\u3057\u3001\u79d8\u5bc6\u3092\u5b88\u308b\u3053\u3068\u3060\u3051\u306f\u5927\u5207\u3067\u3059\u3002Bubbletune\u6c0f\u304c\u5531\u3048\u3066\u3044\u308b\u3053\u3068\u306f\u305d\u3053\u304c\u5b88\u308c\u306a\u3044\u5c64\u304c\u591a\u3044\u3053\u3068\u3092\u5371\u60e7\u3057\u3066\u306e\u610f\u898b\u3060\u3068\u601d\u3044\u307e\u3059\u3002<\/p>\n<blockquote><p><strong>wololo<\/strong><br \/>\nI strongly disagree with this.<br \/>\nI haven&#8217;t seen any kernel exploit going to waste, and I&#8217;ve seen user mode exploits going to waste, but not for the reasons you mention. For example, the Gripshift exploit was wasted, despite being introduced by a known hacker, and because of some drama involving two other experienced developers.<br \/>\nAs far as I&#8217;m concerned, I pride myself to believe that my articles on how to find user exploits and how to write hello worlds have dramatically increased the number of (undisclosed) user exploits and the number of people who now have the knowledge to &#8220;go to the next level&#8221;, therefore helping the scene to be lively. Wasting an exploit does not depend on people&#8217;s programming experience, but on their on their personality, which are two different things.<br \/>\nFinally, the spirit of hacking is in sharing knowledge so that everyone can get better.I definitely agree that revealing an exploit before something useful is made out of it, is definitely not a good thing.<br \/>\nAdditionally, game exploits were considered as &#8220;gold&#8221; not so long ago, even when they only included a hello world. It&#8217;s the PSP Go that changed the rules, not &#8220;noobs&#8221; getting access to more knowledge.<br \/>\n<font color=\"#ff0000\">\u305d\u306e\u8003\u3048\u65b9\u306b\u306f\u8cdb\u6210\u3057\u304b\u306d\u308b\u306a\u3002<br \/>\n\u4eca\u307e\u3067\u30ab\u30fc\u30cd\u30eb\u30e2\u30fc\u30c9exploit\u304c\u7121\u99c4\u306b\u306a\u3063\u305f\u306e\u3092\u898b\u305f\u3053\u3068\u304c\u306a\u3044\u3002\u30e6\u30fc\u30b6\u30fc\u30e2\u30fc\u30c9exploit\u306a\u3089\u3042\u3063\u305f\u3051\u3069\u306d\u3002\u4f8b\u3048\u3070Gripshift\u306eexploit\u306f\u8457\u540d\u306a\u30cf\u30c3\u30ab\u30fc\u304c\u95a2\u308f\u3063\u305f\u306b\u3082\u304b\u304b\u308f\u3089\u305a\u7121\u99c4\u306b\u306a\u3063\u305f\u3051\u308c\u3069\u3001\u305d\u308c\u306f2\u3064\u306e\u30cf\u30c3\u30ab\u30fc\u30c1\u30fc\u30e0(M33\u3068GEN)\u306e\u5bfe\u7acb\u306e\u305b\u3044\u3060\u3057\u3002<br \/>\n\u30e6\u30fc\u30b6\u30fc\u30e2\u30fc\u30c9exploit\u306e\u898b\u3064\u3051\u65b9\u3084Hello World\u306e\u4f5c\u308a\u65b9\u3092\u8a18\u4e8b\u306b\u3057\u3066\u304d\u305f\u3053\u3068\u306f\u9593\u9055\u3063\u3066\u3044\u306a\u3044\u3068\u601d\u3063\u3066\u308b\u3057\u3001\u672a\u767a\u8868\u306a\u3082\u306e\u3082\u542b\u3081\u308b\u3068\u30e6\u30fc\u30b6\u30fc\u30e2\u30fc\u30c9exploit\u306e\u6570\u306f\u5287\u7684\u306b\u5897\u3048\u3066\u308b\u3053\u3068\u304c\u7d50\u679c\u3068\u3057\u3066exploit\u3092\u767a\u898b\u3057\u305f\u4eba\u305f\u3061\u306e\u77e5\u8b58\u3092\u4e00\u6bb5\u4e0a\u306e\u30b9\u30c6\u30c3\u30d7\u3078\u5f15\u304d\u4e0a\u3052\u305f\u3053\u3068\u306b\u306a\u3063\u3066\u308b\u306e\u306f\u4e8b\u5b9f\u3060\u3088\u3002\u3060\u304b\u3089\u30c1\u30e5\u30fc\u30c8\u30ea\u30a2\u30eb\u306fPSP\u30b7\u30fc\u30f3\u306b\u8ca2\u732e\u3057\u3066\u308b\u3068\u601d\u3046\u3002exploit\u3092\u7121\u99c4\u306b\u3059\u308b\u3053\u3068\u3068PSP\u306e\u30d7\u30ed\u30b0\u30e9\u30df\u30f3\u30b0\u7d4c\u9a13\u306f\u95a2\u4fc2\u306a\u3044\u3002<br \/>\n\u6700\u5f8c\u306b\u3001\u30cf\u30c3\u30ad\u30f3\u30b0\u7cbe\u795e\u3068\u3044\u3046\u306e\u306f\u77e5\u8b58\u306e\u5171\u7528\u3060\u3068\u601d\u3063\u3066\u308b\u3057\u3001\u305d\u308c\u3067\u3053\u305d\u307f\u3093\u306a\u304c\u3088\u308a\u826f\u3044\u65b9\u5411\u3078\u5411\u304b\u3048\u308b\u3002\u305f\u3060\u3001exploit\u3092\u4f55\u3089\u304b\u306e\u6709\u76ca\u306a\u5f62\u306b\u3057\u3066\u304b\u3089\u516c\u8868\u3059\u308b\u3068\u3044\u3046\u8003\u3048\u65b9\u306b\u306f\u8cdb\u540c\u3059\u308b\u3002<br \/>\n\u66f4\u306bHello World\u542b\u3081\u3066\u30bb\u30fc\u30d6\u30c7\u30fc\u30bf\u3092\u4f7f\u3063\u305fexploit\u304c\u3082\u3066\u306f\u3084\u3055\u308c\u59cb\u3081\u305f\u306e\u306f\u305d\u3093\u306a\u306b\u524d\u304b\u3089\u306e\u8a71\u3058\u3083\u306a\u3044\u3002PSP go\u306e\u767b\u5834\u3067\u6d41\u308c\u304c\u5909\u308f\u3063\u305f\u3093\u3060\u3002\u521d\u5fc3\u8005\u306b\u3088\u308a\u77e5\u8b58\u3092\u4e0e\u3048\u308b\u305f\u3081\u306a\u3093\u304b\u3058\u3083\u306a\u3044\u3002<\/font><\/p><\/blockquote>\n<p>\u3053\u306e\u969b\u3067\u3059\u304b\u3089\u8a00\u3063\u3066\u304a\u304d\u307e\u3059\u304c\u3001\u79c1\u306fwololo\u6c0f\u306e\u30b7\u30f3\u30d1\u3067\u3059\u3002\u30b7\u30f3\u30d1\u3068\u3044\u3046\u3068\u5b97\u6559\u307f\u305f\u3044\u306b\u805e\u3053\u3048\u307e\u3059\u304c\u3001\u79c1\u306e\u8003\u3048\u65b9\u306b\u9650\u308a\u306a\u304f\u8fd1\u304b\u3063\u305f\u306e\u304cwololo\u6c0f\u3060\u3063\u305f\u3068\u3044\u3046\u3053\u3068\u3067\u3059\u3002\u3053\u308c\u306f\u304b\u306a\u308a\u4ee5\u524d\u304b\u3089\u79c1\u306e\u30d6\u30ed\u30b0\u3092\u8aad\u3093\u3067\u304f\u3060\u3055\u3063\u3066\u3044\u308b\u8aad\u8005\u306e\u65b9\u306f\u3088\u304f\u3054\u5b58\u3058\u3060\u3068\u601d\u3044\u307e\u3059\u3002\u5f7c\u306e\u6d3b\u52d5\u3092\u65e5\u672c\u3067\u8a8d\u77e5\u3057\u3066\u3082\u3089\u3044\u3001\u540c\u8abf\u8005\u3092\u5897\u3084\u3057\u3066PSP\u30b7\u30fc\u30f3\u3092\u76db\u308a\u4e0a\u3052\u305f\u3044\u3068\u3044\u3046\u601d\u3044\u3067\u3053\u308c\u307e\u3067\u53d6\u308a\u7d44\u3093\u3067\u304d\u307e\u3057\u305f\u3002\u5f7c\u306f\u7d76\u5bfe\u306bexploit\u3092\u7121\u99c4\u306b\u306f\u3057\u307e\u305b\u3093\u3002\u79c1\u3082\u540c\u3058\u3067\u3059\u3002\u7279\u6b8a\u306a\u4e8b\u60c5\u304c\u306a\u3044\u9650\u308a\u4e92\u3044\u306bexploit\u3067\u5229\u7528\u3057\u305f\u30b2\u30fc\u30e0\u540d\u3092\u660e\u304b\u3057\u305f\u308a\u3057\u307e\u305b\u3093\u3057\u3001\u4e92\u3044\u306b\u805e\u304f\u3053\u3068\u3059\u3089\u3057\u3066\u3044\u307e\u305b\u3093\u3002\u7279\u6b8a\u306a\u4e8b\u60c5\u3068\u3044\u3046\u306e\u306f\u904e\u53bb\u306e\u4f8b\u3067\u3044\u3046\u3068maku\u6c0f\u306eexploit(\u30d1\u30bf\u30dd\u30f32)\u304c\u305d\u308c\u306b\u5f53\u305f\u308a\u307e\u3059\u3002\u305d\u308c\u3082\u76f4\u63a5\u30b2\u30fc\u30e0\u540d\u3092\u660e\u304b\u3057\u5408\u3063\u305f\u306e\u3067\u306f\u306a\u304f\u767a\u52d5\u65b9\u6cd5\u3092\u78ba\u8a8d\u3057\u3042\u3063\u305f\u306b\u904e\u304e\u307e\u305b\u3093\u3002<br \/>\nwololo\u6c0f\u306e\u8a00\u3046\u901a\u308a\u3001Hello World\u306b\u6210\u529f\u3057\u305f\u5f8c\u306bHBL\u79fb\u690d\u3078\u53d6\u308a\u7d44\u307f\u59cb\u3081\u305fJ416\u6c0f\u306e\u3088\u3046\u306a\u3001\u6b21\u306e\u30b9\u30c6\u30c3\u30d7\u306b\u53d6\u308a\u7d44\u3080\u4eba\u304c\u51fa\u3066\u304d\u3066\u3044\u308b\u4e8b\u5b9f\u3092\u662f\u975e\u4e16\u754c\u4e2d\u306e\u65b9\u3005\u306b\u77e5\u3063\u3066\u3082\u3089\u3044\u305f\u3044\u3068\u601d\u3044\u307e\u3059\u3002<\/p>\n<blockquote><p><strong>m0skit0<\/strong><br \/>\nI must agree with wololo here. And anyways, everyone is free about helping people or not<br \/>\n<font color=\"#ff0000\">wololo\u6c0f\u306e\u8003\u3048\u65b9\u306b\u306f\u8cdb\u540c\u3057\u306a\u304d\u3083\u3044\u3051\u306a\u3044\u306a\u3002\u4f55\u306b\u305b\u3088\u4ef2\u9593\u3068\u5354\u529b\u3057\u3042\u3046\u304b\u3057\u306a\u3044\u304b\u306f\u307f\u3093\u306a\u306e\u81ea\u7531\u3060\u3002<\/font><\/p><\/blockquote>\n<p>\u53d6\u308a\u7d44\u307f\u65b9\u306f\u5341\u4eba\u5341\u8272\u3067\u826f\u3044\u3068\u601d\u3044\u307e\u3059\u3002\u79c1\u306f\u4e92\u3044\u306b\u5354\u529b\u3057\u5408\u3048\u308b\u30b7\u30fc\u30f3\u3092\u76ee\u6307\u3057\u307e\u3059\u3002<\/p>\n<blockquote><p><strong>n00b81<\/strong><br \/>\nAbout &#8220;wasting&#8221; exploits &#8211; it sometimes seems to me that when someone releases a game exploit, usually to try and contribute something good to the scene, they get labeled &#8220;the person who wasted another game exploit&#8221;.This would have happened again without HBL.<br \/>\n<font color=\"#ff0000\">exploit\u3092\u7121\u99c4\u306b\u3059\u308b\u3068\u3044\u3046\u8a71\u3060\u3051\u3069\u3001\u8ab0\u304b\u304c\u30bb\u30fc\u30d6\u30c7\u30fc\u30bf\u4f7f\u3063\u305fexploit\u3092\u30ea\u30ea\u30fc\u30b9\u3059\u308c\u3070\u305d\u308c\u3092\u4f7f\u3063\u3066\u4f55\u3068\u304b\u3057\u3088\u3046\u3068\u3059\u308b\u4eba\u305f\u3061\u304c\u51fa\u3066\u304f\u308b\u306e\u306f\u826f\u304f\u3042\u308b\u8a71\u3002\u300cexploit\u3092\u7121\u99c4\u306b\u3057\u305f\u5974\u300d\u3068\u3044\u3046\u30ec\u30c3\u30c6\u30eb\u306f\u8cbc\u3089\u308c\u308b\u3051\u308c\u3069\u3001Half-Byte Loader\u3067\u5b9f\u969b\u540c\u3058\u3053\u3068\u304c\u8d77\u3053\u3063\u3066\u308b\u3002<\/font><\/p><\/blockquote>\n<p>\u305d\u306e\u901a\u308a\u3067\u3059\u306d\u3002PSP\u306b\u30aa\u30fc\u30d7\u30f3\u30bd\u30fc\u30b9\u306e\u8003\u3048\u65b9\u3067\u306f\u3058\u3081\u304b\u3089\u53d6\u308a\u7d44\u3093\u3060\u306e\u306fHBL\u304c\u6700\u521d\u3067\u3059\u3002\u826f\u3044\u6d41\u308c\u3060\u3068\u79c1\u306f\u8a55\u4fa1\u3057\u3066\u3044\u307e\u3059\u3002<\/p>\n<blockquote><p><strong>MaxMouseDLL<\/strong><br \/>\nSo you&#8217;re all proposing a live and let live scenario for people who spam gamesaves with &#8220;AAAAA&#8221; get a crash then are unwilling\/unable to learn more about it because they simply want the fame of &#8220;finding an exploit&#8221;.<br \/>\n<font color=\"#ff0000\">\u307f\u3093\u306a\u304c\u30d0\u30ab\u306e\u4e00\u3064\u899a\u3048\u307f\u305f\u3044\u306b&#8221;AAAAA&#8221;\u3092\u30bb\u30fc\u30d6\u30c7\u30fc\u30bf\u306b\u5165\u308c\u3066\u30b2\u30fc\u30e0\u3092\u30af\u30e9\u30c3\u30b7\u30e5\u3055\u305b\u3066\u305d\u308c\u4ee5\u4e0a\u306e\u3053\u3068\u3092\u899a\u3048\u3082\u305b\u305a\u306b&#8221;exploit\u767a\u898b\uff01&#8221;\u3068\u304b\u8a00\u3063\u3066\u540d\u8a89\u304c\u6b32\u3057\u3044\u3060\u3051\u3067\u3057\u3087\u3002<\/font><\/p><\/blockquote>\n<p>\u305d\u308c\u306f\u9055\u3044\u307e\u3059\u3002&#8221;AAAAA&#8221;\u306f\u524d\u4f8b\u304c\u3042\u3063\u3066\u5206\u304b\u308a\u3084\u3059\u3044\u304b\u3089\u4f7f\u3063\u3066\u3044\u308b\u3060\u3051\u3067\u3059\u3002\u5c11\u306a\u304f\u3068\u3082GameGaz\u30d5\u30a9\u30fc\u30e9\u30e0\u3067\u5831\u544a\u3057\u3066\u304f\u308c\u305f\u7686\u3055\u3093\u306f\u540d\u8a89\u304c\u6b32\u3057\u304f\u3066\u3084\u3063\u3066\u3044\u308b\u308f\u3051\u3067\u306f\u3042\u308a\u307e\u305b\u3093\u3002\u81ea\u5206\u3082\u3084\u3063\u3066\u307f\u305f\u3044\u3068\u3044\u3046\u524d\u5411\u304d\u306a\u6c17\u6301\u3061\u304b\u3089\u3060\u3068\u601d\u3044\u307e\u3059\u3002\u958b\u767a\u8005\u306e\u305f\u3081\u306e\u30d5\u30a9\u30fc\u30e9\u30e0Lan.st\u306b\u81ea\u5206\u304b\u3089exploit\u3092\u767a\u898b\u3057\u305f\u3053\u3068\u3092\u8a87\u793a\u3059\u308b\u305f\u3081\u306b\u6295\u7a3f\u3059\u308b\u3088\u3046\u306a\u4eba\u306f\u305d\u3046\u304b\u3082\u77e5\u308c\u307e\u305b\u3093\u304c\u3001\u5c11\u306a\u304f\u3068\u3082\u6211\u3005\u306f\u9055\u3044\u307e\u3059\u3002\u79c1\u306e\u8a71\u3082Lan.st\u306b\u51fa\u307e\u3057\u305f\u304c\u3001\u8ab0\u304b\u304c\u77e5\u3089\u306a\u3044\u3068\u3053\u308d\u3067\u52dd\u624b\u306b\u898b\u3064\u3051\u3066\u5f15\u7528\u3057\u305f\u5f62\u3067\u3042\u308a\u3001\u79c1\u306f\u76f4\u63a5\u565b\u3093\u3067\u3044\u307e\u305b\u3093\u3002<\/p>\n<blockquote><p><strong>Bubbletune<\/strong><br \/>\nLet&#8217;s have a look at the exploits Sony has fixed since 5.00:<br \/>\n<font color=\"#ff0000\">\u30bd\u30cb\u30fc\u304c\u30d5\u30a1\u30fc\u30e0\u30a6\u30a7\u30a25.00\u4ee5\u964d\u306b\u5bfe\u7b56\u3057\u305f\u3082\u306e\u3092\u4e26\u3079\u3066\u307f\u308b\u3088\u3002<\/font><\/p>\n<p style=\"padding-left:2em\">\u2022 Tiff exploit<br \/>\n\u2022 Gripshift<br \/>\n\u2022 Pursuit Force<br \/>\n\u2022 Medal of Honor: Heroes<br \/>\n\u2022 Medal of Honor: Heroes 2<br \/>\n\u2022 Archer Maclean&#8217;s Mercury<br \/>\n\u2022 Hydrium<br \/>\n\u2022 Mercury Meltdown<br \/>\n\u2022 Patapon<br \/>\n\u2022 Splinter Cell Essentials<br \/>\n\u2022 Patapon 2<br \/>\n\u2022 Fuuun Shinsengumi Bakumatsu<\/p>\n<p>Fuuun Shinsengumi Bakumatsu, Hydrium and Pursuit Force don&#8217;t count as they were never released. Mercury, Mercury 2 and Gripshift don&#8217;t count. That leaves 6 that count, of which only 2 were put to good use (Tiff exploit &#8211; HEN, Patapon 2 exploit &#8211; eLoader). Just do the math, 2\/3rd of the exploits are getting wasted. Even if you don&#8217;t count the sequals that were fixed, it leaves you at half of the exploits released being wasted. How that benefits the scene is above me. I&#8217;m well aware that the threshold for finding kernel exploits is a bar higher than finding user exploits, but only to the extent that you need to know basic computer architecture. If you&#8217;re a PC programmer you may be able to find a kernel exploit, but you won&#8217;t be able to write something as a HEN.<br \/>\n<font color=\"#ff0000\">\u300e\u98a8\u96f2\u65b0\u64b0\u7d44 \u5e55\u672b\u4f1d \u30dd\u30fc\u30bf\u30d6\u30eb\u300f\u300e\u3010Hg\u3011\u30cf\u30a4\u30c9\u30ea\u30a6\u30e0\u300f\u300ePursuit Force: Extreme Justice\u300f\u306fexploit\u304c\u30ea\u30ea\u30fc\u30b9\u3055\u308c\u3066\u306a\u3044\u304b\u3089\u7701\u304f\u3068\u3057\u3088\u3046\u3002\u300eMercury\u300f\u300eMercury 2\u300f\u300eGripshift\u300f\u3082\u7701\u304f\u3002\u6b8b\u308a\u306f6\u3064\u3060\u3051\u3069\u3001\u3046\u30612\u3064\u304c\u5b9f\u7528\u7684\u306a\u3082\u306e\u306b\u306a\u3063\u305f(Tiff exploit\u306fHEN\u3068\u3057\u3066\u3001Patapon 2 exploit\u306feLoader\u3068\u3057\u3066\u5b9f\u7528\u5316)\u3053\u3068\u306b\u306a\u308b\u3002\u3064\u307e\u308a\u8a08\u7b97\u4e0a\u306f2\/3\u306eexploit\u304c\u7121\u99c4\u306b\u306a\u3063\u305f\u3053\u3068\u306b\u306a\u308b\u3002\u4eee\u306b\u7d9a\u7de8\u3082\u306e\u3092\u6570\u306b\u5165\u308c\u308b\u306e\u3092\u3084\u3081\u305f\u3068\u3057\u3066\u3082\u534a\u5206\u304c\u7121\u99c4\u306b\u306a\u3063\u305f\u3053\u3068\u306b\u306a\u308b\u3002\u305d\u308c\u306e\u3069\u3053\u304c\u6709\u76ca\u306a\u306e\u304b\u5168\u304f\u308f\u304b\u3089\u306a\u3044\u3002<br \/>\n\u30ab\u30fc\u30cd\u30eb\u30e2\u30fc\u30c9exploit\u3092\u898b\u3064\u3051\u308b\u3053\u3068\u306f\u30e6\u30fc\u30b6\u30fc\u30e2\u30fc\u30c9exploit\u3088\u308a\u6577\u5c45\u304c\u9ad8\u3044\u3053\u3068\u306f\u5206\u304b\u3063\u3066\u308b\u3051\u308c\u3069\u3001\u9055\u3044\u306f\u57fa\u672c\u7684\u306a\u30b3\u30f3\u30d4\u30e5\u30fc\u30bf\u306e\u4ed5\u7d44\u307f\u3092\u899a\u3048\u3066\u308b\u5fc5\u8981\u304c\u3042\u308b\u304b\u306a\u3044\u304b\u3060\u3051\u3002PC\u306e\u30d7\u30ed\u30b0\u30e9\u30de\u30fc\u306a\u3089\u30ab\u30fc\u30cd\u30eb\u30e2\u30fc\u30c9exploit\u3092\u898b\u3064\u3051\u308b\u4e8b\u306f\u3067\u304d\u308b\u306f\u305a\u3002\u3067\u3082HEN\u306e\u3088\u3046\u306a\u3082\u306e\u307e\u3067\u306f\u7121\u7406\u3060\u3051\u3069\u306d\u3002<\/font><\/p><\/blockquote>\n<p>\u300e\u98a8\u96f2\u65b0\u64b0\u7d44 \u5e55\u672b\u4f1d \u30dd\u30fc\u30bf\u30d6\u30eb\u300f\u306b\u3064\u3044\u3066\u306f\u5168\u304f\u4e0d\u660e\u3067\u3059(\u77e5\u3063\u3066\u3044\u308b\u4eba\u304c\u3044\u305f\u3089\u6559\u3048\u3066\u304f\u3060\u3055\u3044)\u3002\u300e\u3010Hg\u3011\u30cf\u30a4\u30c9\u30ea\u30a6\u30e0\u300f\u306fArcher Maclean&#8217;s Mercury\u306e\u65e5\u672c\u7248\u3001\u300ePursuit Force: Extreme Justice\u300f\u306f\u79c1\u3082\u4e00\u679a\u565b\u3093\u3067\u3044\u308b\u306e\u3067\u7533\u3057\u8a33\u306a\u304b\u3063\u305f\u3093\u3067\u3059\u304c\u3001\u5358\u306a\u308b\u30af\u30e9\u30c3\u30b7\u30e5\u3067\u3057\u304b\u3042\u308a\u307e\u305b\u3093\u3067\u3057\u305f(\u3057\u3064\u3053\u304f\u63a2\u305b\u3070\u8106\u5f31\u6027\u306f\u3042\u3063\u305f\u306e\u304b\u3082\u3057\u308c\u307e\u305b\u3093)\u3002\u300e\u3010Hg\u3011\u30cf\u30a4\u30c9\u30ea\u30a6\u30e0\u300f\u3092\u6319\u3052\u3066\u3044\u308b\u3053\u3068\u304b\u3089\u3082\u5206\u304b\u308b\u901a\u308a\u3001\u30bf\u30a4\u30c8\u30eb\u3060\u3051\u6bd4\u3079\u3066\u3044\u308b\u4e2d\u8eab\u672a\u7cbe\u67fb\u306e\u4e2d\u9014\u534a\u7aef\u306a\u30ea\u30b9\u30c8\u3067\u3059\u3002<br \/>\n\u3053\u3053\u304b\u3089\u5206\u304b\u308b\u306e\u306f<br \/>\n<strong>1: \u540c\u3058\u30b2\u30fc\u30e0\u306f\u5168\u30ea\u30fc\u30b8\u30e7\u30f3\u5bfe\u7b56\u3055\u308c\u308b<br \/>\n2: \u7d9a\u7de8\u304c\u3042\u308b\u5834\u5408\u306b\u306f\u3042\u308f\u305b\u3066\u5bfe\u7b56\u3055\u308c\u308b<\/strong><br \/>\n\u305d\u3057\u3066\u6211\u3005\u304c\u5b66\u3093\u3060\u3053\u3068\u306f\u3001\u5358\u306a\u308b\u30af\u30e9\u30c3\u30b7\u30e5\u3067\u3057\u304b\u306a\u304b\u3063\u305f\u300ePursuit Force: Extreme Justice\u300f\u3067\u5206\u304b\u308b\u901a\u308a<br \/>\n<strong>3: \u4eee\u306b\u30af\u30e9\u30c3\u30b7\u30e5\u3067\u3042\u3063\u3066\u3082\u516c\u958b\u3059\u308b\u3053\u3068\u3067\u5bfe\u7b56\u3055\u308c\u3066\u3057\u307e\u3046<\/strong><br \/>\n\u3068\u3044\u3046\u3053\u3068\u3067\u3059\u3002\u300eSplinter Cell Essentials\u300f\u3082\u9014\u4e2d\u3067\u516c\u958b\u3055\u308c\u3066\u3057\u307e\u3063\u305f\u306e\u3067\u4f3c\u305f\u3088\u3046\u306a\u3082\u306e\u3067\u3059\u306d\u3002<\/p>\n<p>\u516c\u958b=\u5bfe\u7b56\u3055\u308c\u308b\u3001\u3068\u3044\u3046\u4e8b\u5b9f\u304c\u78ba\u8a8d\u3067\u304d\u305f\u3060\u3051\u3067\u3082\u6709\u76ca\u3060\u3063\u305f\u3067\u3057\u3087\u3046\u3002<\/p>\n<p>PSP go\u306f\u30b2\u30fc\u30e0\u3092\u5165\u624b\u3059\u308b\u306b\u306fPSN\u304b\u3089\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u3059\u308b\u3057\u304b\u624b\u304c\u306a\u3044\u305f\u3081\u3001\u30b2\u30fc\u30e0\u540d\u3092\u516c\u8868\u3059\u308b\u3053\u3068\u3067\u5373\u5ea7\u306b\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u3067\u304d\u306a\u304f\u3055\u308c\u308b\u306a\u3069\u306e\u5bfe\u7b56\u304c\u5bb9\u6613\u306b\u53d6\u3089\u308c\u3066\u3057\u307e\u3046\u3053\u3068\u304b\u3089\u3042\u308b\u6642\u304b\u3089\u30b2\u30fc\u30e0\u540d\u516c\u8868\u3057\u306a\u304f\u306a\u308a\u307e\u3057\u305f\u304c\u3001\u4eee\u306bUMD\u306e\u307f\u3067\u3042\u3063\u3066\u3082\u516c\u8868\u3059\u308b\u3053\u3068\u3067\u5bfe\u7b56\u3055\u308c\u308b\u306e\u3067\u7d50\u679c\u7684\u306b\u306f\u4eca\u306e\u3088\u3046\u306b\u65e9\u671f\u306b\u30b2\u30fc\u30e0\u540d\u3092\u660e\u304b\u3055\u306a\u304f\u306a\u3063\u305f\u306e\u306f\u826f\u304b\u3063\u305f\u306e\u3060\u3068\u601d\u3044\u307e\u3059\u3002\u3044\u308d\u3093\u306a\u3053\u3068\u304c\u5b9f\u306f\u660e\u3089\u304b\u306b\u306a\u3063\u305f\u306e\u306f\u3053\u3046\u3044\u3063\u305f\u72a0\u7272\u306b\u306a\u3063\u305f\u30b2\u30fc\u30e0\u9054\u306e\u304a\u304b\u3052\u3067\u3059\u3002\u6c7a\u3057\u3066\u3059\u3079\u3066\u304c\u7121\u99c4\u3060\u3063\u305f\u3068\u306f\u601d\u3044\u307e\u305b\u3093\u3002<\/p>\n<blockquote><p><strong>SifJar<\/strong><br \/>\nAs more and more devs are dropping out of the &#8220;scene&#8221;, there NEEDS to be information available for others to access.<br \/>\nPeople need to stop saying an exploit is wasted when its released, and just quickly make something useful for it.<br \/>\n<font color=\"#ff0000\">\u591a\u304f\u306e\u958b\u767a\u8005\u304c\u53bb\u3063\u3066\u884c\u3051\u3070\u884c\u304f\u307b\u3069\u60c5\u5831\u306f\u5fc5\u8981\u3067\u3057\u3087\u3002\u30ea\u30ea\u30fc\u30b9\u3055\u308c\u308b\u305f\u3073\u306bexploit\u3092\u7121\u99c4\u306b\u3057\u305f\u3068\u8a00\u3046\u306e\u306f\u3084\u3081\u308b\u3079\u304d\u3060\u3068\u601d\u3046\u3057\u3001\u4f55\u3089\u304b\u306e\u6709\u52b9\u306a\u4f7f\u3044\u9053\u3092\u898b\u3044\u3060\u3059\u305f\u3081\u306b\u306a\u308b\u3079\u304f\u65e9\u304f\u4f55\u304b\u4f5c\u308b\u3079\u304d\u3002<\/font><\/p><\/blockquote>\n<p>\u305d\u3046\u3067\u3059\u306d\u3002\u65e9\u3081\u306b\u5229\u7528\u4fa1\u5024\u306e\u3042\u308b\u3082\u306e\u306b\u6607\u83ef\u3055\u305b\u308b\u3053\u3068\u306f\u5fc5\u8981\u3060\u3068\u601d\u3044\u307e\u3059\u3002\u305f\u3060\u3001\u305d\u306e\u5ea6\u306b\u30d5\u30a1\u30fc\u30e0\u30a6\u30a7\u30a2\u306e\u30d0\u30fc\u30b8\u30e7\u30f3\u304c\u4e0a\u304c\u3063\u3066\u3057\u307e\u3046\u3068\u8a00\u3046\u88cf\u306e\u9762\u3082\u3042\u308a\u307e\u3059\u306e\u3067\u3042\u308b\u7a0b\u5ea6\u6642\u9593\u3092\u304a\u304f\u3053\u3068\u3082\u5fc5\u8981\u3067\u306f\u306a\u3044\u3067\u3057\u3087\u3046\u304b\u3002UMD\u306e\u8981\u6c42\u30d5\u30a1\u30fc\u30e0\u306b\u5f71\u97ff\u304c\u51fa\u307e\u3059\u3002<\/p>\n<blockquote><p><strong>Bubbletune<\/strong><br \/>\nAgreed, but not publically! Form a group of developers and keep the information inside until you&#8217;re ready to release a full-fledged homebrew enabler. It will benefit the scene so much more.<br \/>\nThere have been 2 exploits released for the same firmware, how does that benefit anyone? Even if you port it to both, one of them will still be wasted. Back in the days of Promotheus (and all it&#8217;s members), they could plan the release of each exploit carefully, even if they had them for months, so they were released at an interval of a few firmwares, rather than all at once.<br \/>\n<font color=\"#ff0000\">\u78ba\u304b\u306b\u305d\u306e\u901a\u308a\u3002\u3067\u3082\u4e00\u822c\u5316\u3059\u308b\u306e\u306f\u3069\u3046\u304b\u3068\u601d\u3046\u3002\u958b\u767a\u8005\u306e\u30b0\u30eb\u30fc\u30d7\u3092\u5f62\u6210\u3057\u3066\u4e00\u4eba\u524d\u306eHomebrew Enabler\u3068\u3057\u3066\u516c\u958b\u3067\u304d\u308b\u307e\u3067\u306f\u30b0\u30eb\u30fc\u30d7\u5185\u3060\u3051\u306b\u60c5\u5831\u306f\u7559\u3081\u3066\u304a\u304f\u3079\u304d\u3002<br \/>\n\u540c\u3058\u30d5\u30a1\u30fc\u30e0 \u30a6\u30a7\u30a2\u30672\u3064\u306eexploit\u304c\u30ea\u30ea\u30fc\u30b9\u3059\u308b\u3053\u3068\u306f\u8ab0\u306b\u30e1\u30ea\u30c3\u30c8\u304c\u3042\u308b\uff1f\u4eee\u306b\u540c\u6642\u306b\u30ea\u30ea\u30fc\u30b9\u3057\u305f\u3068\u3057\u3066\u3082\u7247\u65b9\u306f\u7121\u99c4\u306b\u3057\u305f\u3053\u3068\u3068\u540c\u3058\u3060\u3002Dak-Alex \u6c0f\u306e\u9803\u306ePromotheus\u6642\u4ee3\u306e\u3088\u3046\u306b\u30012\u3064\u540c\u6642\u306b\u30ea\u30ea\u30fc\u30b9\u3059\u308b\u3088\u308a\u306f\u7247\u65b9\u3092\u5927\u5207\u306b\u4fdd\u7ba1\u3057\u30d5\u30a1\u30fc\u30e0\u30a6\u30a7\u30a2\u3054\u3068\u306b\u8a08\u753b\u7684\u306b\u30ea\u30ea\u30fc\u30b9\u3059\u3079\u304d\u3002<\/font><\/p><\/blockquote>\n<p>\u540c\u3058\u30d5\u30a1\u30fc\u30e0\u30a6\u30a7\u30a2\u30672\u3064\u306eexploit\u3092\u30ea\u30ea\u30fc\u30b9\u3059\u308b\u3053\u3068\u306f\u78ba\u304b\u306b\u7121\u99c4\u3067\u3059\u3002\u6b21\u306e\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u3067\u540c\u6642\u306b\u5bfe\u7b56\u3055\u308c\u3066\u3057\u307e\u3044\u307e\u3059\u3002<br \/>\n\u305f\u3060\u96e3\u3057\u3044\u306e\u306f\u3001\u30b2\u30fc\u30e0\u3092\u4f7f\u3046\u4ee5\u4e0a\u305d\u306e\u30b2\u30fc\u30e0\u3092\u3067\u304d\u308b\u3060\u3051\u591a\u304f\u306e\u30e6\u30fc\u30b6\u30fc\u306b\u5165\u624b\u3057\u3066\u3082\u3089\u3046\u5fc5\u8981\u304c\u3042\u308b\u3068\u3044\u3046\u90e8\u5206\u3067\u3059\u3002\u305d\u3082\u305d\u3082\u6570\u5343\u672c\u3057\u304b\u58f2\u308c\u306a\u304b\u3063\u305f\u30b2\u30fc\u30e0\u3067HBL\u304c\u52d5\u4f5c\u3057\u305f\u3068\u3057\u3066\u3082\u3001\u30e6\u30fc\u30b6\u30fc\u30e2\u30fc\u30c9exploit\u3067\u3042\u308b\u4ee5\u4e0a\u8d77\u52d5\u306e\u5ea6\u306b\u305d\u306e\u30b2\u30fc\u30e0\u304c\u5fc5\u8981\u306b\u306a\u308b\u308f\u3051\u3067\u3001\u6975\u8ad6\u3059\u308c\u3070\u6570\u5343\u672c\u3057\u304b\u5e02\u5834\u306b\u306a\u3044\u30b2\u30fc\u30e0\u306e\u5834\u5408\u306f\u6570\u5343\u4eba\u3057\u304bHBL\u3092\u8d77\u52d5\u3067\u304d\u306a\u3044\u3053\u3068\u306b\u306a\u308a\u307e\u3059\u3002\u30bf\u30a4\u30df\u30f3\u30b0\u6b21\u7b2c\u3067\u3059\u304c\u3001\u540c\u6642\u306b2\u3064\u306eexploit\u3092\u5229\u7528\u3059\u308b\u3053\u3068\u3067\u6069\u6075\u306b\u3042\u305a\u304b\u308b\u30e6\u30fc\u30b6\u30fc\u6570\u3092\u5897\u3084\u3059\u3068\u3044\u3046\u9078\u629e\u80a2\u3082\u8996\u91ce\u306b\u5165\u308c\u308b\u5fc5\u8981\u304c\u3042\u308b\u304b\u3082\u3057\u308c\u307e\u305b\u3093\u3002\u3042\u307e\u308a\u305d\u306e\u624b\u306f\u4f7f\u3044\u305f\u304f\u3042\u308a\u307e\u305b\u3093\u304c\u3002<\/p>\n<blockquote><p><strong>n00b81<\/strong><br \/>\nI think there was a chance for others to step up and really make that exploit even cooler and really make the most of a perfect user exploit, Example: MaTiAz releases tiff user exploit, Davee a few days later announces he has a kernel exploit and is working on a HEN. That&#8217;s the type of &#8220;team work&#8221; I&#8217;m talking about here, and doesn&#8217;t happen enough IMO.<br \/>\n<font color=\"#ff0000\">\u50d5\u306f\u30e6\u30fc\u30b6\u30fc\u30e2\u30fc\u30c9exploit\u3092\u5b9f\u969b\u306b\u4f5c\u3063\u3066\u307f\u308b\u4f53\u9a13\u3068\u3044\u3046\u306e\u306f\u5927\u4e8b\u3060\u3057\u3001\u4ed6\u306e\u4eba\u306b\u3068\u3063\u3066\u306f\u30b9\u30c6\u30c3\u30d7\u30a2\u30c3\u30d7\u306e\u30c1\u30e3\u30f3\u30b9\u3067\u3082\u3042\u308b\u3068\u601d\u3046\u3002\u4f8b\u3048\u3070 MaTiAz\u6c0f\u304c\u30e6\u30fc\u30b6\u30fc\u30e2\u30fc\u30c9\u306eTIFF exploit\u3092\u30ea\u30ea\u30fc\u30b9\u3057\u305f\u6570\u65e5\u5f8c\u306bDavee\u6c0f\u304c\u30ab\u30fc\u30cd\u30eb\u30e2\u30fc\u30c9exploit\u3092\u898b\u3064\u3051\u3066HEN\u958b\u767a\u306b\u53d6\u308a\u7d44\u3093\u3067\u3044\u308b\u3053\u3068\u3092\u516c\u8868\u3057\u307e\u3057\u305f\u3088\u306d\u3002\u3042\u308c\u304c \u3044\u308f\u3086\u308b&#8221;\u30c1\u30fc\u30e0\u30ef\u30fc\u30af&#8221;\u306e\u5178\u578b\u4f8b\u3060\u3051\u3069\u3001\u500b\u4eba\u7684\u306b\u306f\u305d\u3093\u306a\u306b\u983b\u7e41\u306b\u3042\u308b\u3053\u3068\u3058\u3083\u306a\u3044\u304b\u3089\u8cb4\u91cd\u306a\u30c1\u30e3\u30f3\u30b9\u3060\u3063\u305f\u3068\u601d\u3046\u3002<\/font><\/p><\/blockquote>\n<p>\u30c1\u30fc\u30e0\u30ef\u30fc\u30af\u306f\u91cd\u8981\u3067\u3059\u3002<br \/>\n\u73fe\u5728\u79c1\u306e\u767a\u898b\u3057\u305fexploit\u3092\u5229\u7528\u3057\u3066J416\u6c0f\u304cHBL\u79fb\u690d\u306b\u53d6\u308a\u7d44\u3093\u3067\u304f\u308c\u3066\u3044\u307e\u3059\u3002\u3053\u308c\u3082\u3042\u308b\u610f\u5473\u306e\u30c1\u30fc\u30e0\u30ef\u30fc\u30af\u3067\u3059(\u306a\u305cJ416\u6c0f\u304c\u53d6\u308a\u7d44\u3093\u3067\u304f\u308c\u305f\u306e\u304b\u306a\u3069\u306e\u88cf\u8a71\u306f\u305d\u306e\u3046\u3061\u304a\u8a71\u3057\u3057\u307e\u3059)\u3002\u3053\u308c\u3067J416\u6c0f\u304c\u30b9\u30c6\u30c3\u30d7\u30a2\u30c3\u30d7\u3057\u3066\u304f\u308c\u308c\u3070\u3053\u3093\u306a\u306b\u5b09\u3057\u3044\u3053\u3068\u306f\u3042\u308a\u307e\u305b\u3093\u3002\u305f\u3060\u3001\u6975\u5c11\u6570\u306e\u4eba\u306b\u8ca0\u62c5\u3092\u304b\u3051\u308b\u3068\u9577\u7d9a\u304d\u3057\u306a\u304f\u306a\u308a\u307e\u3059\u304b\u3089\u3001\u305d\u3053\u3092\u3069\u3046\u3059\u308b\u306e\u304b\u304c\u4eca\u5f8c\u306e\u8ab2\u984c\u3067\u3082\u3042\u308a\u307e\u3059\u3002\u5049\u305d\u3046\u306b\u8a00\u3048\u308b\u7acb\u5834\u3067\u306f\u3042\u308a\u307e\u305b\u3093\u3051\u3069\u3002<\/p>\n<blockquote><p><strong>jeerum<\/strong>\u6c0f<br \/>\nits exploit owner choice to release it or not<br \/>\n<font color=\"#ff0000\">\u30ea\u30ea\u30fc\u30b9\u3059\u308b\u304b\u3057\u306a\u3044\u304b\u306fexploit\u306e\u6301\u3061\u4e3b\u304c\u6c7a\u3081\u308b\u3053\u3068\u3067\u3057\u3087\u3002<\/font><\/p><\/blockquote>\n<p>\u305d\u306e\u901a\u308a\u3067\u3059\u3002\u79c1\u3082\u52d5\u753b\u516c\u958b\u4e00\u3064\u3068\u3063\u3066\u3082\u3067\u304d\u308b\u9650\u308a\u767a\u898b\u8005\u306e\u4e86\u89e3\u3092\u5f97\u308b\u3088\u3046\u306b\u3057\u3066\u3044\u307e\u3059\u3002\u5c11\u306a\u304f\u3068\u3082\u52dd\u624b\u306b\u306f\u3084\u308a\u307e\u305b\u3093\u3057\u3001\u52d5\u753b\u3092\u516c\u958b\u3057\u305f\u3089\u9023\u7d61\u3092\u5165\u308c\u308b\u3088\u3046\u306b\u3057\u3066\u3044\u307e\u3059\u3002\u5e78\u3044GameGaz\u30d5\u30a9\u30fc\u30e9\u30e0\u306b\u5831\u544a\u3092\u3057\u3066\u304f\u3060\u3055\u308b\u7686\u3055\u3093\u306f\u304d\u3061\u3093\u3068\u3055\u308c\u3066\u3044\u308b\u65b9\u3070\u304b\u308a\u306a\u306e\u3067\u60c5\u5831\u306f\u304d\u3061\u3093\u3068\u7ba1\u7406\u3057\u3066\u304f\u3060\u3055\u3063\u3066\u3044\u307e\u3059\u3002\u975e\u5e38\u306b\u5b09\u3057\u304f\u601d\u3063\u3066\u3044\u307e\u3059\u3002<\/p>\n<blockquote><p><strong>wololo<\/strong><br \/>\nregarding MOHH: well, it&#8217;s the exploit that started HBL. M0skit0 and ab5000 put 6 months of efforts into it before we found the patapon exploit. Without the MOHH exploit, HBL probably wouldn&#8217;t exist at all. So, yes, to me the MOHH exploit was a huge benefit to the scene. And voila, the math is reversed, now 2\/3rd of the exploits were actually useful, the only one that was wasted was wasted by experienced devs of the scene, everybody makes mistakes<br \/>\nwell in an ideal world, hacker teams would have enough exploit to share some of them. keep one for studies, release the other. I know that&#8217;s too optimistic&#8230;But honestly, an exploit used only by a couple people for several months&#8230; what&#8217;s the point of studying a system when all the people who had an interest in it (the users) are gone? I think there&#8217;s a concern of &#8220;being a lively scene&#8221; that we should take into account. I know that Team Typhoon has no reason to trust the end users anymore, so I know where you&#8217;re coming from with this.<br \/>\n<font color=\"#ff0000\">\u300e\u30e1\u30c0\u30eb\u30aa\u30d6\u30aa\u30ca\u30fc\u30d2\u30fc\u30ed\u30fc\u30ba\u300f\u306fHBL\u958b\u767a\u30b9\u30bf\u30fc\u30c8\u306e\u304d\u3063\u304b\u3051\u306b\u306a\u3063\u305fexploit\u3060\u3002M0skit0 \u6c0f\u3068ab5000\u6c0f\u306f\u79c1\u305f\u3061\u304c\u300ePatapon2\u300fexploit\u3092\u767a\u898b\u3059\u308b\u534a\u5e74\u3082\u524d\u304b\u3089\u958b\u767a\u3092\u3057\u3066\u3044\u305f\u3051\u308c\u3069\u3001MOHH exploit\u304c\u306a\u304b\u3063\u305f\u3089HBL\u306f\u5168\u304f\u5b58\u5728\u3059\u3089\u3057\u3066\u3044\u306a\u304b\u3063\u305f\u306e\u306f\u9593\u9055\u3044\u306a\u3044\u3002\u305d\u3046\u3001\u3060\u304b\u3089MOHH exploit\u306fPSP\u30b7\u30fc\u30f3\u306b\u3068\u3063\u3066\u306f\u975e\u5e38\u306b\u5927\u304d\u306a\u5229\u76ca\u3092\u3082\u305f\u3089\u3057\u305f\u3068\u8a00\u3048\u308b\u30022\/3\u304c\u7121\u99c4\u306b\u306a\u3063\u305f\u3068\u306e\u8003\u3048\u65b9\u3082\u898b\u65b9\u3092\u5909\u3048\u308c\u30702\/3\u306eexploit\u304c\u5b9f\u969b\u306b\u306f\u6709\u76ca\u3060\u3063\u305f\u304b\u3082\u3057\u308c\u306a\u3044\u308f\u3051\u3067\u3001\u3057\u304b\u3082\u7121\u99c4\u306b\u306a\u3063\u305fexploit\u3068\u3044\u3046\u306e\u306f\u5358\u306b\u305d\u308c\u306b\u643a\u308f\u3063\u305f\u958b\u767a\u8005\u81ea\u8eab\u306b\u8cac\u4efb\u304c\u3042\u308b\u3002\u307f\u3093\u306a\u52d8\u9055\u3044\u3057\u3066\u3044\u308b\u3002<br \/>\n\u7406\u60f3\u7684\u306b\u306f\u30cf\u30c3\u30ab\u30fc\u30c1\u30fc\u30e0\u304c\u3042\u308b\u7a0b\u5ea6\u5341\u5206\u306a\u6570\u306eexploit\u3092\u30b7\u30a7\u30a2\u3057\u3066\u304a\u304f\u3079\u304d\u3060\u308d\u3046\u3002\u7814\u7a76\u7528\u3084\u30ea\u30ea\u30fc\u30b9\u7528\u306a\u3069\u7528\u9014\u3092\u5206\u3051\u3066\u3002\u305d\u308c\u304c\u4e00\u756a\u3044\u3044\u306e\u306f\u5206\u304b\u3063\u3066\u308b\u304c\u3001\u6b63\u76f4\u306a\u3068\u3053\u308dexploit\u306f\u6570\u30f6\u6708\u306b\u6e21\u308a\u6570\u4eba\u304c\u305d\u308c\u306b\u643a\u308f\u308b\u7a0b\u5ea6\u304c\u73fe\u5b9f\u3002\u8208\u5473\u304c\u3042\u308b\u4eba\u305f\u3061\u306b\u3068\u3063\u3066\u306f\u7814\u7a76\u3059\u308b\u30c1\u30e3\u30f3\u30b9\u3055\u3048\u306a\u3044\u306e\u3067\u306f\uff1f&#8221;\u4ecaPSP\u30b7\u30fc\u30f3\u306b\u3044\u308b&#8221;\u3053\u3068\u306b\u95a2\u5fc3\u3092\u6301\u3063\u3066\u3082\u3089\u3046\u306b\u306f\u305d\u3046\u3044\u3063\u305f\u4eca\u306f\u5358\u306a\u308b\u30e6\u30fc\u30b6\u30fc\u3068\u547c\u3070\u308c\u308b\u3088\u3046\u306a\u4eba\u305f\u3061\u306b\u53c2\u52a0\u3057\u3066\u3082\u3089\u3046\u5fc5\u8981\u304c\u3042\u308b\u3068\u306f\u601d\u3046\u304c\u3001Team Typhoon\u304c\u3082\u3046\u30a8\u30f3\u30c9\u30e6\u30fc\u30b6\u30fc\u3092\u4fe1\u7528\u3067\u304d\u306a\u3044\u3068\u8a00\u3063\u3066\u3044\u308b\u306e\u306f\u77e5\u3063\u3066\u3044\u308b\u306e\u3067\u3001\u305d\u306e\u8fba\u304c\u554f\u984c\u3060\u308d\u3046\u3002<\/font><\/p><\/blockquote>\n<p>\u7814\u7a76\u7528\u3067\u3042\u308c\u3070\u65e2\u306b\u5bfe\u7b56\u3055\u308c\u305fexploit\u3092\u7528\u3044\u308c\u3070\u826f\u3044\u306e\u3067\u306f\u306a\u3044\u304b\u3068\u601d\u3044\u307e\u3059\u3002<br \/>\nexploit\u3092\u767a\u898b\u3059\u308b\u306b\u306fPSP\u304cCFW\u3067\u3042\u308b\u3053\u3068\u304c\u5fc5\u8981\u3067\u3059\u304c\u3001\u4e00\u756a\u65b0\u3057\u3044CFW\u3067\u30825.50GEN\u30675.50\u30d9\u30fc\u30b9\u3067\u3059\u3057\u3001\u30d7\u30ed\u30e1\u30c6\u30a6\u30b9\u304c\u30ea\u30ea\u30fc\u30b9\u3055\u308c\u305f\u305f\u30815.00M33\u306b\u623b\u3057\u305f\u65b9\u3082\u6ca2\u5c71\u3044\u308b\u3068\u601d\u3044\u307e\u3059\u30025.00M33\u3067\u3042\u308c\u3070\u5148\u8ff0\u306e\u5bfe\u7b56\u3055\u308c\u305f\u30b2\u30fc\u30e0\u306eexploit\u304c\u52d5\u4f5c\u3057\u307e\u3059\u3002\u3082\u3061\u308d\u3093\u6700\u65b0FW\u3067\u306e\u52d5\u4f5c\u304c\u524d\u63d0\u306e\u672a\u767a\u8868exploit\u306e\u307b\u3046\u304c\u826f\u3044\u306e\u306f\u5f53\u7136\u3067\u3059\u3057\u3001\u65e2\u306b\u5bfe\u7b56\u3055\u308c\u305f\u30b2\u30fc\u30e0\u3067\u3044\u304f\u3089\u53d6\u308a\u7d44\u3093\u3067\u3082\u5fdc\u7528\u7bc4\u56f2\u306f\u304b\u306a\u308a\u9650\u5b9a\u3055\u308c\u307e\u3059\u3002\u305d\u308c\u3067\u3082\u3053\u308c\u304b\u3089\u53d6\u308a\u7d44\u3080\u304d\u3063\u304b\u3051\u3068\u3057\u3066\u306f\u3053\u3093\u306a\u306b\u6709\u76ca\u306a\u984c\u6750\u306f\u306a\u3044\u3068\u601d\u3044\u307e\u3059\u3002\u7121\u99c4\u306b\u306a\u3063\u305f\u3068\u5606\u304f\u3088\u308a\u3082\u6559\u6750\u304c\u5897\u3048\u305f\u3053\u3068\u3092\u559c\u3073\u307e\u3057\u3087\u3046\u3002<\/p>\n<blockquote><p><strong>Bubbletune<\/strong><br \/>\nWhen we released ChickHEN we had at least 5 kernel exploits, but Sony fixed them all by auditing. It&#8217;s just to show that one exploit held back for research isn&#8217;t enough, as they may just incidentally fix it in the next firmware.<br \/>\n<font color=\"#ff0000\">\u6211\u3005\u304cChickHEN\u3092\u30ea\u30ea\u30fc\u30b9\u3057\u305f\u6642\u306b\u306f\u5c11\u306a\u304f\u3068\u3082\u30ab\u30fc\u30cd\u30eb\u30e2\u30fc\u30c9exploit\u30925\u3064\u306f\u6301\u3063\u3066\u3044\u305f\u304c\u3001\u30bd\u30cb\u30fc\u304c\u8abf\u3079\u3066\u5bfe\u7b56\u3057\u3066\u3057\u307e\u3063\u305f\u3002\u3060\u304b\u3089\u73fe\u72b6\u306e\u3088\u3046\u306b1\u3064\u3060\u3051\u7814\u7a76\u7528\u306bexploit\u3092\u6301\u3063\u3066\u3044\u308b\u3060\u3051\u3067\u306f\u6b21\u306e\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u3067\u3064\u3055\u308c\u308b\u53ef\u80fd\u6027\u304c\u3042\u308a\u4e0d\u5341\u5206\u3060\u3002<\/font><\/p><\/blockquote>\n<p>\u8907\u6570\u306eexploit\u3092\u6e96\u5099\u3057\u3066\u304a\u304f\u3053\u3068\u306f\u5b89\u5fc3\u306b\u7e4b\u304c\u308b\u306e\u3067\u60aa\u3044\u3053\u3068\u3060\u3068\u306f\u601d\u3044\u307e\u305b\u3093\u304c\u3001\u554f\u984c\u306f\u305d\u308c\u3092\u3069\u3046\u3084\u3063\u3066\u7ba1\u7406\u3059\u308b\u304b\u3067\u3059\u3002\u305d\u3053\u304c\u4eca\u4e00\u756a\u306e\u60a9\u307f\u3069\u3053\u308d\u3067\u3059\u3002<\/p>\n<p>\u5fc5\u8981\u306b\u5fdc\u3058\u3066wololo\u6c0f\u3068\u9023\u7d61\u3092\u3068\u3063\u3066\u767a\u898b\u3057\u305fexploit\u3092Half-Byte Loader\u306e\u89e6\u5a92\u3068\u3057\u3066\u6d3b\u7528\u3057\u3066\u3044\u304f\u3053\u3068\u304c\u4e00\u756a\u7c21\u5358\u306b\u601d\u3044\u3064\u304f\u65b9\u6cd5\u3067\u3059\u304c\u3001\u305d\u308c\u3067\u306f\u65e5\u672c\u3067\u306e\u74b0\u5883\u304c\u9032\u5316\u3057\u307e\u305b\u3093\u3002wololo\u6c0f\u306e\u8a00\u3046\u901a\u308a\u3001\u6b21\u306e\u30b9\u30c6\u30c3\u30d7\u3092\u76ee\u6307\u3059\u5fc5\u8981\u304c\u3042\u308b\u304b\u3089\u3067\u3059\u3002\u6025\u306b\u306f\u74b0\u5883\u306f\u5909\u308f\u308a\u307e\u305b\u3093\u306e\u3067\u3053\u306e\u3042\u305f\u308a\u3092\u3069\u306e\u3088\u3046\u306b\u3057\u3066\u884c\u304f\u306e\u304c\u826f\u3044\u306e\u3060\u308d\u3046\u304b\u3068\u60a9\u3093\u3067\u3044\u307e\u3059\u3002<\/p>\n<p>\u307e\u3060\u65e5\u672c\u3067\u306ePSP\u30cf\u30c3\u30af\u306f\u6d77\u5916\u306b\u6bd4\u3079\u308b\u3068\u9032\u3093\u3067\u3044\u307e\u305b\u3093\u3002\u305d\u308c\u306f\u60c5\u5831\u5171\u6709\u74b0\u5883\u304c\u6d77\u5916\u306b\u6bd4\u3079\u308b\u3068\u52a3\u3063\u3066\u3044\u305f\u305f\u3081\u3060\u3068\u601d\u3063\u3066\u3044\u307e\u3059\u3002\u79c1\u304cGameGaz\u30d5\u30a9\u30fc\u30e9\u30e0\u3092\u7acb\u3061\u4e0a\u3052\u305f\u306e\u306f\u3001\u8b70\u8ad6\u306e\u5834\u3092\u65e5\u672c\u3067\u4f5c\u308a\u305f\u304b\u3063\u305f\u304b\u3089\u3067\u3059\u3002\u3082\u3061\u308d\u3093\u8b70\u8ad6\u3057\u3066\u304f\u4e0a\u3067Hello World\u306b\u6210\u529f\u3057\u305f\u3053\u3068\u304c\u3042\u308b\u3001\u3068\u3044\u3046\u4e8b\u5b9f\u306f\u975e\u5e38\u306b\u5927\u5207\u3067\u3001\u8b70\u8ad6\u306e\u8cea\u3092\u9ad8\u3081\u308b\u5f79\u5272\u3092\u3059\u308b\u3068\u601d\u3044\u307e\u3059\u3002\u3067\u3059\u306e\u3067\u79c1\u306fwololo\u6c0f\u306eHello World\u30c1\u30e5\u30fc\u30c8\u30ea\u30a2\u30eb\u304c\u9593\u9055\u3063\u3066\u3044\u308b\u3068\u306f\u601d\u3044\u307e\u305b\u3093\u3002\u30c1\u30e5\u30fc\u30c8\u30ea\u30a2\u30eb\u304c\u3042\u3063\u3066\u3053\u305d\u306e\u4eca\u3067\u3059\u3002<\/p>\n<p>\u5148\u306eLan.st\u30d5\u30a9\u30fc\u30e9\u30e0\u306e\u30c8\u30d4\u30c3\u30af\u3067\u3001\u8efd\u3005\u3057\u304fexploit\u767a\u898b\u3068\u3044\u3046\u306e\u306f\u65b9\u6cd5\u8ad6\u3068\u3057\u3066\u9593\u9055\u3063\u3066\u3044\u308b\u3001\u3068\u8a00\u308f\u308c\u3066\u3044\u308b\u4e2d\u306b\u6211\u3005\u304c\u542b\u307e\u308c\u3066\u3044\u308b\u3060\u308d\u3046\u3053\u3068\u306f\u60f3\u50cf\u306b\u96e3\u304f\u306a\u3044\u3067\u3059\u304c\u3001\u6570\u5e74\u5f8c\u306b\u306f\u5f7c\u3089\u306bGameGaz\u30d5\u30a9\u30fc\u30e9\u30e0\u3067\u3042\u308c\u3070\u4fe1\u7528\u3067\u304d\u308b\u3001\u3068\u601d\u308f\u308c\u308b\u3088\u3046\u306a\u9032\u6b69\u3092\u9042\u3052\u3066\u884c\u3051\u308b\u3053\u3068\u3092\u9858\u3063\u3066\u3044\u307e\u3059\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<p>wololo\u6c0f\u306e\u516c\u958b\u3057\u305fPSP\u306eexploit\u3092\u7528\u3044\u305f\u30d0\u30a4\u30ca\u30ea\u30ed\u30fc\u30c0\u30fc\u306e\u4f5c\u308a\u65b9(Hello World\u306e\u30c1\u30e5\u30fc\u30c8\u30ea\u30a2\u30eb)\u306b\u3064\u3044\u3066\u3001Lan.st\u30d5\u30a9\u30fc\u30e9\u30e0\u3067\u305d\u306e\u662f\u975e\u304c\u8b70\u8ad6\u3055\u308c\u3066\u3044\u307e\u3057\u305f\u3002\u79c1\u306fPSP\u30cf\u30c3\u30ad\u30f3\u30b0\u30b7\u30fc\u30f3\u306e\u88fe\u91ce\u3092\u5e83\u3052\u305f\u3068\u3044\u3046\u610f\u5473\u3067\u753b\u671f\u7684\u3067\u3042\u3063\u305f\u3068\u8003\u3048\u3066\u3044\u307e\u3059\u3002<a href=\"https:\/\/gamegaz.jp\/blog\/%e8%bb%bd%e3%81%84exploit%e7%99%ba%e8%a6%8b%e3%80%81hello-world%e3%83%81%e3%83%a5%e3%83%bc%e3%83%88%e3%83%aa%e3%82%a2%e3%83%ab%e3%81%ae%e6%98%af%e9%9d%9e\/\" title=\"\"\u8efd\u3044\"exploit\u767a\u898b\u3001Hello World\u30c1\u30e5\u30fc\u30c8\u30ea\u30a2\u30eb\u306e\u662f\u975e\" class=\"more-link\">\u300c&#8221;\u8efd\u3044&#8221;exploit\u767a\u898b\u3001Hello World\u30c1\u30e5\u30fc\u30c8\u30ea\u30a2\u30eb\u306e\u662f\u975e\u300d\u306e\u7d9a\u304d\u3092\u8aad\u3080<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[37,48,49,60,57,54,56,13,43,30,36],"class_list":["post-223","post","type-post","status-publish","format-standard","hentry","category-psp-hack","tag-exploit","tag-half-byte-loader","tag-hbl","tag-hello-world","tag-homebrew","tag-m0skit0","tag-patapon","tag-psp","tag-psp-go","tag-sony","tag-wololo"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/gamegaz.jp\/blog\/wp-json\/wp\/v2\/posts\/223","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gamegaz.jp\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gamegaz.jp\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gamegaz.jp\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/gamegaz.jp\/blog\/wp-json\/wp\/v2\/comments?post=223"}],"version-history":[{"count":16,"href":"https:\/\/gamegaz.jp\/blog\/wp-json\/wp\/v2\/posts\/223\/revisions"}],"predecessor-version":[{"id":238,"href":"https:\/\/gamegaz.jp\/blog\/wp-json\/wp\/v2\/posts\/223\/revisions\/238"}],"wp:attachment":[{"href":"https:\/\/gamegaz.jp\/blog\/wp-json\/wp\/v2\/media?parent=223"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gamegaz.jp\/blog\/wp-json\/wp\/v2\/categories?post=223"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gamegaz.jp\/blog\/wp-json\/wp\/v2\/tags?post=223"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}