It seems that the project PS3Xploit advance a little, even if nothing is actually confirmed on the kernel exploit side, the dump part begins to bear fruit.
The developer esc0rtd3w has just explained on Psx-place that they now have a SuperSlim 4201A that will allow them to perform more advanced tests in private and thus no longer have to request public dumps for now.
And for good reason, it seems that some jealous reported to Sony the method used by IDPS Dumper to perform the operation under firmware 4.81 so that Sony corrects the fault exploited.
The Team asks to stay on the firmware 4.81!
When the team echoed the fact that the method was reported to Sony, she warned that Sony will probably update the firmware, it should be disconnected to disable automatic updates because a possible 4.82 PS3Xploit butcher.
Originally, the team asked for dumps tests on eMMC memory models (12 GB) and asked for feedback on the CECH-40xxA, CECH-42xxA and CECH-43xxA but now as it has a CECH -4201A she no longer needs public help.
The first 7 bytes of a real IDPS is: 00 00 00 00 01 00 8 X 00 the X (corresponding to the Country).
What's new in version v0.2.1
- Added eMMC SuperSlim models (CECH-40xxA, CECH-42xxA, CECH-43xxA)
- Some Tweaks for the feat
How to use this:
*** MAKE SURE TO RUN AS ADMINISTRATOR ***
install python to use server.py or another HTTP server of your choosing on both Windows and Linux!
On windows - Install any of these optional HTTP servers:
MiniWeb: https://sourceforge....latest/download
Python (for server.py): https://www.python.o...thon-2.7.14.msi
XAMPP: https://downloadsapa...4-installer.exe
On linux:
install python for your distribution using apt-get, yum, and similar commands.
make script executable using "chmod a+x server.py" or "chmod 775 server.py" or "chmod 777 server.py"
execute python script using "/usr/bin/python $exploitFolder/server.py" or "./server.py"
Update on Android: (instructions from @No0bZiLLa)
I can confirm this does work if using an http server on Android. what i did was downloaded the zip (on my phone) and extracted it and then download something like Simple HTTP Server and point the server to the folder that contains index.html. once you do that just reload the server and make a note of what the ip
ort is. then just go to ps3, type in ip
ort (eg 192.168.2.7:12345) as specified in simple http server and then select the appropriate button for your system.
Then run (for python):
On windows - windows.bat
On linux - linux.sh
Usage Tips:
1) Try using a LAN connection or a solid WiFi connection during exploitation. A weak signal can cause problems.
2) If the exploit takes more than 5 minutes to work, reload page, browser, or restart console and try again.
3) If you are using a LAN connection and experience network issues, make sure all cables to router are in working order.
Download: http://www.filedropper.com/ps3idpsdumper-v021-ps3xploit
MD5 Hash: 71268E3829CB78D818E8E0DE890E4140
SHA-256 Hash: BCE1AB277804BE7540286D9106FE58AFA231696F4174053C611DB5A18048CB71
The developer esc0rtd3w has just explained on Psx-place that they now have a SuperSlim 4201A that will allow them to perform more advanced tests in private and thus no longer have to request public dumps for now.
And for good reason, it seems that some jealous reported to Sony the method used by IDPS Dumper to perform the operation under firmware 4.81 so that Sony corrects the fault exploited.

The Team asks to stay on the firmware 4.81!
When the team echoed the fact that the method was reported to Sony, she warned that Sony will probably update the firmware, it should be disconnected to disable automatic updates because a possible 4.82 PS3Xploit butcher.
Originally, the team asked for dumps tests on eMMC memory models (12 GB) and asked for feedback on the CECH-40xxA, CECH-42xxA and CECH-43xxA but now as it has a CECH -4201A she no longer needs public help.

The first 7 bytes of a real IDPS is: 00 00 00 00 01 00 8 X 00 the X (corresponding to the Country).
What's new in version v0.2.1
- Added eMMC SuperSlim models (CECH-40xxA, CECH-42xxA, CECH-43xxA)
- Some Tweaks for the feat
How to use this:
*** MAKE SURE TO RUN AS ADMINISTRATOR ***
install python to use server.py or another HTTP server of your choosing on both Windows and Linux!
On windows - Install any of these optional HTTP servers:
MiniWeb: https://sourceforge....latest/download
Python (for server.py): https://www.python.o...thon-2.7.14.msi
XAMPP: https://downloadsapa...4-installer.exe
On linux:
install python for your distribution using apt-get, yum, and similar commands.
make script executable using "chmod a+x server.py" or "chmod 775 server.py" or "chmod 777 server.py"
execute python script using "/usr/bin/python $exploitFolder/server.py" or "./server.py"
Update on Android: (instructions from @No0bZiLLa)
I can confirm this does work if using an http server on Android. what i did was downloaded the zip (on my phone) and extracted it and then download something like Simple HTTP Server and point the server to the folder that contains index.html. once you do that just reload the server and make a note of what the ip


Then run (for python):
On windows - windows.bat
On linux - linux.sh
Usage Tips:
1) Try using a LAN connection or a solid WiFi connection during exploitation. A weak signal can cause problems.
2) If the exploit takes more than 5 minutes to work, reload page, browser, or restart console and try again.
3) If you are using a LAN connection and experience network issues, make sure all cables to router are in working order.
Download: http://www.filedropper.com/ps3idpsdumper-v021-ps3xploit
MD5 Hash: 71268E3829CB78D818E8E0DE890E4140
SHA-256 Hash: BCE1AB277804BE7540286D9106FE58AFA231696F4174053C611DB5A18048CB71