Recently developer @Al Azif aka _AlAzif announced a Status Update on Github alongside a Bolt-on Feature for Existing PS4 / PS5 Exploits work-in-progress (WIP) via X Post while stating, "I'll probably wait bundle it with a different unreleased project when that's ready so there's a BIG release all at once."
However, _AlAzif also notes, "Utility wise, it's great, but it's not a huge change if you already use a HW device/caching, don't make this seem like something bigger than it is. It's not some bootchain code exec so much as doing some tricky stuff to make things seem like they persist through a reboot."
This comes following Al Azif's DNS Menu, the PlayStation 4 EMC CFW Guide, PS4 CFW Toolkit to Decrypt / Encrypt Firmware Files, Al-Azif's DNS Update FAQ adding a Github Sponsors Page , FTPS5: Persistent PS5 FTP Payload and a PS5-Ready Exploit Host for Self-Hosting PlayStation 5 Exploits.
Below is a summary via _AlAzif with related X posts:
Status Update: Updates (September 1st, 2024)
Looks like it'll probably take me a few days to get through all my DMs
we might have semi permanence on ps4 and ps5 soon.
It's a bolt-on feature for existing exploits, it's not really an exploit itself so much as a misconfiguration/allowing certain things they shouldn't. The bolt-on itself is patchable on PS5 for sure, PS4 there *should* always be a work around if they "patch" it.
It's essential multiple separate components working in tandem to poke each other and overwrite system settings to keep certain things set up a certain way for certain unintended behavior.
For exploits that don't require any HW, it doesn't need additional HW. However the exploit needs to have a webkit entry point, so the exfat exploit will work with HW (should work with existing HW with new software flashed to it). But the PPPoE exploit will not work with it.
It prevents DNS hijacking and updates, on boot. I only found one way to "uninstall" it on accident (I may have a way to prevent that even, but I haven't tested it yet), beyond yanking the HDD, resetting to factory, etc. You basically need to intend to remove it to disable it.
If your console has internet available the bolt-on will automatically update if changes are published to the GitHub repo. I'll likely add settings for it in the PS4s settings so people can configure it how they like.
It works on PS4 to latest FW, the elements that allow it to function were tested on PS5, so it should work there as well. It was not tested as a whole on PS5 because I want to finish the PS4 implementation first. Because of this I don't know how/when I want to release it.
I'll probably wait bundle it with a different unreleased project when that's ready so there's a BIG release all at once.
Utility wise, it's great, but it's not a huge change if you already use a HW device/caching, don't make this seem like something bigger than it is. It's not some bootchain code exec so much as doing some tricky stuff to make things seem like they persist through a reboot.
That's about all I'll say for now.
The new thing should eliminate the need for a DNS, once installed, though.
It's not CFW. No features of the exploit/HEN change. Just how it's launched.
No idea, if you read anything I have said it's not an exploit and I'm not working on the PS5.
There is a certain reason you'd use it on 9.00 with an ESP device.I can't really say more about it without disclosing stuff I don't want to talk about yet. Hopefully we get another webkit + software kernel exploit chain for the PS4 now that we're basically at a soft EOL.
Seems there is another separate freelist corruption coming to ps4 and ps5 but the team behind it doesn't seem to want to disclose it so soon, not even to hacker one. it is possible that this exploit only comes to EOL ps4 times.
similar to what the flow does on 3.xx and 4.xx aka a very powerful bug
However, _AlAzif also notes, "Utility wise, it's great, but it's not a huge change if you already use a HW device/caching, don't make this seem like something bigger than it is. It's not some bootchain code exec so much as doing some tricky stuff to make things seem like they persist through a reboot."
This comes following Al Azif's DNS Menu, the PlayStation 4 EMC CFW Guide, PS4 CFW Toolkit to Decrypt / Encrypt Firmware Files, Al-Azif's DNS Update FAQ adding a Github Sponsors Page , FTPS5: Persistent PS5 FTP Payload and a PS5-Ready Exploit Host for Self-Hosting PlayStation 5 Exploits.
Below is a summary via _AlAzif with related X posts:
Status Update: Updates (September 1st, 2024)
Looks like it'll probably take me a few days to get through all my DMs
we might have semi permanence on ps4 and ps5 soon.
It's a bolt-on feature for existing exploits, it's not really an exploit itself so much as a misconfiguration/allowing certain things they shouldn't. The bolt-on itself is patchable on PS5 for sure, PS4 there *should* always be a work around if they "patch" it.
It's essential multiple separate components working in tandem to poke each other and overwrite system settings to keep certain things set up a certain way for certain unintended behavior.
For exploits that don't require any HW, it doesn't need additional HW. However the exploit needs to have a webkit entry point, so the exfat exploit will work with HW (should work with existing HW with new software flashed to it). But the PPPoE exploit will not work with it.
It prevents DNS hijacking and updates, on boot. I only found one way to "uninstall" it on accident (I may have a way to prevent that even, but I haven't tested it yet), beyond yanking the HDD, resetting to factory, etc. You basically need to intend to remove it to disable it.
If your console has internet available the bolt-on will automatically update if changes are published to the GitHub repo. I'll likely add settings for it in the PS4s settings so people can configure it how they like.
It works on PS4 to latest FW, the elements that allow it to function were tested on PS5, so it should work there as well. It was not tested as a whole on PS5 because I want to finish the PS4 implementation first. Because of this I don't know how/when I want to release it.
I'll probably wait bundle it with a different unreleased project when that's ready so there's a BIG release all at once.
Utility wise, it's great, but it's not a huge change if you already use a HW device/caching, don't make this seem like something bigger than it is. It's not some bootchain code exec so much as doing some tricky stuff to make things seem like they persist through a reboot.
That's about all I'll say for now.
The new thing should eliminate the need for a DNS, once installed, though.
It's not CFW. No features of the exploit/HEN change. Just how it's launched.
- 5.05-7.55: All software, no external device needed.
- 9.00: Needs an external device, like an ESP32-S2.
- 9.03-11.00: Does not work currently because the PPPoE exploit does not use a webkit entrypoint.
No idea, if you read anything I have said it's not an exploit and I'm not working on the PS5.
There is a certain reason you'd use it on 9.00 with an ESP device.I can't really say more about it without disclosing stuff I don't want to talk about yet. Hopefully we get another webkit + software kernel exploit chain for the PS4 now that we're basically at a soft EOL.
Seems there is another separate freelist corruption coming to ps4 and ps5 but the team behind it doesn't seem to want to disclose it so soon, not even to hacker one. it is possible that this exploit only comes to EOL ps4 times.
similar to what the flow does on 3.xx and 4.xx aka a very powerful bug