PS2 Independence Exploit: Difference between revisions

Content deleted Content added
Details on swap techniques
Line 6:
The exploit relies on creating a deliberately incorrect entry inside this file, which triggers a [[buffer overflow]] and, combined with a small stub loader located in the file, allows the execution of unencrypted code from the Memory Card upon the insertion of a specific PS1 game. Normally, only programs encrypted by Sony, such as the DVD player, will run from the Memory Card.
 
The discovery of this vulnerability in the PS2's software opens up the possibility of running programs created by the PS2 homebrew developer community without the need for a [[modchip]] or disc swapping techniques (e.g. ''CogSwap'' or ''Swap Magic'').
 
These swap techniques use a hardware exploit of the PlayStation 2. They use a tool to open the disc drive tray without the PS2 knowing on "fat" units or using a different tool to push the "flap closed" sensor on slimline units. The latter is also used on swap discs for the original PlayStation.
 
===Installation===