« on: February 12, 2015, 06:28:01 pm »
I have recently been looking into ripping 3D models from PS2 games and have naturally met with a brick wall in file encryption. Yes, I have tried 3DX Ripper but for my purposes it isn't accurate enough and thus I need the models directly. As it stands now, I'm at a loss for how to extract the algorithms for unpacking the files of the game games I have in mind. With information on this specific topic kinda hard to come by (a lot of what I've found either involves 3DX Ripper or SVR tools along with a surprising amount of virus laden sites) I'm currently looking to hear peoples experiences with these file types directly. Right now, I'm investigating rams dumps with PCS2X 0.9.8 or PS2rd in hopes of finding the algorithm or, at least, the next step to work with within. As the topic states, if you have any suggestions or information based on your own work with these compression types please share it. Below are some basic answers to questions you might have.
"Hacking is hard."
You don't say? Sarcasm aside, I know this requires effort and won't be done in a day, nor do I expect it to be. This is a pet project I return to every few days to whittle away at.
"What games are you trying to decrypt?"
Ring of Red (.BIN)
Gungriffon Blaze (.PAC)
Front Mission 4,5,Online (4 and 5 use .DAT, not sure about Online)
"You do know they are gener-"
Yes, I know .BIN/.DAT/.PAC are generic catch alls for unique encryptions.
"What are you going to do with the models?"
Scale them down, add some ball joints, 3D print them, put them on my shelf.
"Have you tried QuickBMS?"
Yes, with no luck.
"Have you used a hex editor to view the files?"
Yes, all of them are solely gibberish except for the DVDIMAGE.DAT of Front Mission 4 which contains what I think are references to model files but I've never seen "femur" and "clavicle" used in relation to a mech before.