Join Us and become a Member for a Verified Badge to access private areas with the latest PS4 / PS5 PKGs.
Category PS5 CFW and Hacks       Thread starter Thread starter PSXHAX       Date / timeStart date Sep 4, 2024 at 4:55 PM       Replies 22      
Recently developer @Al Azif aka _AlAzif announced a Status Update on Github alongside a Bolt-on Feature for Existing PS4 / PS5 Exploits work-in-progress (WIP) via X Post while stating, "I'll probably wait bundle it with a different unreleased project when that's ready so there's a BIG release all at once." :unsure:

However, _AlAzif also notes, "Utility wise, it's great, but it's not a huge change if you already use a HW device/caching, don't make this seem like something bigger than it is. It's not some bootchain code exec so much as doing some tricky stuff to make things seem like they persist through a reboot."

This comes following Al Azif's DNS Menu, the PlayStation 4 EMC CFW Guide, PS4 CFW Toolkit to Decrypt / Encrypt Firmware Files, Al-Azif's DNS Update FAQ adding a Github Sponsors Page <3, FTPS5: Persistent PS5 FTP Payload and a PS5-Ready Exploit Host for Self-Hosting PlayStation 5 Exploits.

Below is a summary via _AlAzif with related X posts:

Status Update: Updates (September 1st, 2024)
Looks like it'll probably take me a few days to get through all my DMs
we might have semi permanence on ps4 and ps5 soon.
It's a bolt-on feature for existing exploits, it's not really an exploit itself so much as a misconfiguration/allowing certain things they shouldn't. The bolt-on itself is patchable on PS5 for sure, PS4 there *should* always be a work around if they "patch" it.
It's essential multiple separate components working in tandem to poke each other and overwrite system settings to keep certain things set up a certain way for certain unintended behavior.
For exploits that don't require any HW, it doesn't need additional HW. However the exploit needs to have a webkit entry point, so the exfat exploit will work with HW (should work with existing HW with new software flashed to it). But the PPPoE exploit will not work with it.
It prevents DNS hijacking and updates, on boot. I only found one way to "uninstall" it on accident (I may have a way to prevent that even, but I haven't tested it yet), beyond yanking the HDD, resetting to factory, etc. You basically need to intend to remove it to disable it.
If your console has internet available the bolt-on will automatically update if changes are published to the GitHub repo. I'll likely add settings for it in the PS4s settings so people can configure it how they like.
It works on PS4 to latest FW, the elements that allow it to function were tested on PS5, so it should work there as well. It was not tested as a whole on PS5 because I want to finish the PS4 implementation first. Because of this I don't know how/when I want to release it.
I'll probably wait bundle it with a different unreleased project when that's ready so there's a BIG release all at once.
Utility wise, it's great, but it's not a huge change if you already use a HW device/caching, don't make this seem like something bigger than it is. It's not some bootchain code exec so much as doing some tricky stuff to make things seem like they persist through a reboot.
That's about all I'll say for now.
The new thing should eliminate the need for a DNS, once installed, though.
It's not CFW. No features of the exploit/HEN change. Just how it's launched.
  • 5.05-7.55: All software, no external device needed.
  • 9.00: Needs an external device, like an ESP32-S2.
  • 9.03-11.00: Does not work currently because the PPPoE exploit does not use a webkit entrypoint.
It should work on PS5 3.xx-4.xx, but I'm not working on that until the PS4 one is 100% polished. I have no idea when a release is coming. There's a lot of stuff to weigh in on it. There are some components I'll probably publish earlier because they can be used for other stuff.
No idea, if you read anything I have said it's not an exploit and I'm not working on the PS5.
There is a certain reason you'd use it on 9.00 with an ESP device.I can't really say more about it without disclosing stuff I don't want to talk about yet. Hopefully we get another webkit + software kernel exploit chain for the PS4 now that we're basically at a soft EOL.
Seems there is another separate freelist corruption coming to ps4 and ps5 but the team behind it doesn't seem to want to disclose it so soon, not even to hacker one. it is possible that this exploit only comes to EOL ps4 times.
similar to what the flow does on 3.xx and 4.xx aka a very powerful bug
Bolt-on Feature for Existing PS4 PS5 Exploits WIP by Al Azif.png
 

Comments

I have a 9.0 i was planning on doing the raspberry pie to automate the jailbreak but was leaning towards the esp soldered inside the console. Looks like this will probably be easier with a external pie though.

I wonder if the new jailbreak will being us any closer to custom firmware, i do remember the ps3 jailbreak not happening for a long time after the release.

Do a lot to people still sit at the 5.05 jailbreak or do most people sit on 9.0 so you don't have to install the backport package ?
 
This is good to know. It's truly remarkable the dedication the PS4/PS5 homebrew devs have towards making the process easier. They could have literally stopped at anytime but yet they keep coming out with improvements to make our lives easier :) Reminds me of early jailbreaking days
 
Developing anything extra will always benefit the scene. I wonder when we will see a permanent exploit. I for one am happy with goldhen for now.
 
Exciting times ahead perhaps? I am still on GoldHen 9.00 for now and have not updated my PS5 for a long time. There are still a lot of great PS4 games to keep me busy but it is getting tempting with new PS5 games coming on the horizon :)

GoldHen is great but the instability is a bit annoying sometimes, looking forward to updates following this site. Keep up the good work :love:
 
Very exciting news... my girlfriend has already restarted/logged out/powered off my PS 4 times and I had to JB again... one day it was TWICE IN A ROW RIGHT AFTER I HAD JUST FIXED IT. I would settle with just being able to remove those options from her profile.
 
Stability is what I'm most curious about as well. My 9.00 with the Raspberry Pi setup is still fairly unstable with PSFree. I can't tell if it has something to do with when I click 'OK' after the USB emulation goes away, or if it's something else, but it almost always takes 2 tries.

As for PS5... I always have to turn my machine on and let it sit for a couple minutes to have high chance of going on the first try. If I boot and immediately try the exploit, I almost always crash.

Not sure the reasoning on either of my two scenarios, but a high-stability auto-jailbreak on startup would be amazing! Very excited :)
 
Back
Top