Join Us and become a Member for a Verified Badge to access private areas with the latest PS4 / PS5 PKGs.
Category PS5 CFW and Hacks       Thread starter Thread starter PSXHAX       Date / timeStart date Sep 4, 2024 at 4:55 PM       Replies 22      
Recently developer @Al Azif aka _AlAzif announced a Status Update on Github alongside a Bolt-on Feature for Existing PS4 / PS5 Exploits work-in-progress (WIP) via X Post while stating, "I'll probably wait bundle it with a different unreleased project when that's ready so there's a BIG release all at once." :unsure:

However, _AlAzif also notes, "Utility wise, it's great, but it's not a huge change if you already use a HW device/caching, don't make this seem like something bigger than it is. It's not some bootchain code exec so much as doing some tricky stuff to make things seem like they persist through a reboot."

This comes following Al Azif's DNS Menu, the PlayStation 4 EMC CFW Guide, PS4 CFW Toolkit to Decrypt / Encrypt Firmware Files, Al-Azif's DNS Update FAQ adding a Github Sponsors Page <3, FTPS5: Persistent PS5 FTP Payload and a PS5-Ready Exploit Host for Self-Hosting PlayStation 5 Exploits.

Below is a summary via _AlAzif with related X posts:

Status Update: Updates (September 1st, 2024)
Looks like it'll probably take me a few days to get through all my DMs
we might have semi permanence on ps4 and ps5 soon.
It's a bolt-on feature for existing exploits, it's not really an exploit itself so much as a misconfiguration/allowing certain things they shouldn't. The bolt-on itself is patchable on PS5 for sure, PS4 there *should* always be a work around if they "patch" it.
It's essential multiple separate components working in tandem to poke each other and overwrite system settings to keep certain things set up a certain way for certain unintended behavior.
For exploits that don't require any HW, it doesn't need additional HW. However the exploit needs to have a webkit entry point, so the exfat exploit will work with HW (should work with existing HW with new software flashed to it). But the PPPoE exploit will not work with it.
It prevents DNS hijacking and updates, on boot. I only found one way to "uninstall" it on accident (I may have a way to prevent that even, but I haven't tested it yet), beyond yanking the HDD, resetting to factory, etc. You basically need to intend to remove it to disable it.
If your console has internet available the bolt-on will automatically update if changes are published to the GitHub repo. I'll likely add settings for it in the PS4s settings so people can configure it how they like.
It works on PS4 to latest FW, the elements that allow it to function were tested on PS5, so it should work there as well. It was not tested as a whole on PS5 because I want to finish the PS4 implementation first. Because of this I don't know how/when I want to release it.
I'll probably wait bundle it with a different unreleased project when that's ready so there's a BIG release all at once.
Utility wise, it's great, but it's not a huge change if you already use a HW device/caching, don't make this seem like something bigger than it is. It's not some bootchain code exec so much as doing some tricky stuff to make things seem like they persist through a reboot.
That's about all I'll say for now.
The new thing should eliminate the need for a DNS, once installed, though.
It's not CFW. No features of the exploit/HEN change. Just how it's launched.
  • 5.05-7.55: All software, no external device needed.
  • 9.00: Needs an external device, like an ESP32-S2.
  • 9.03-11.00: Does not work currently because the PPPoE exploit does not use a webkit entrypoint.
It should work on PS5 3.xx-4.xx, but I'm not working on that until the PS4 one is 100% polished. I have no idea when a release is coming. There's a lot of stuff to weigh in on it. There are some components I'll probably publish earlier because they can be used for other stuff.
No idea, if you read anything I have said it's not an exploit and I'm not working on the PS5.
There is a certain reason you'd use it on 9.00 with an ESP device.I can't really say more about it without disclosing stuff I don't want to talk about yet. Hopefully we get another webkit + software kernel exploit chain for the PS4 now that we're basically at a soft EOL.
Seems there is another separate freelist corruption coming to ps4 and ps5 but the team behind it doesn't seem to want to disclose it so soon, not even to hacker one. it is possible that this exploit only comes to EOL ps4 times.
similar to what the flow does on 3.xx and 4.xx aka a very powerful bug
Bolt-on Feature for Existing PS4 PS5 Exploits WIP by Al Azif.png
 

Comments

Great news. I've got a PS4 on 10.01 that I just picked up and I've been a little disappointed that there's no persistence.

All in all though I am lucky that it was exploitable and it is fairly easy to do. This only makes things better, so I'm excited to see it!
 
I am on FW 9.00 with the jailbreak working pretty well. I cannot wait to see what this is.

It would be great for an auto jailbreak without a webkit each time or the use of an ESP32 s2. I currently use webkit since I want to use a wired connection for remote play. I hate switching the network each time I jailbreak with a raspberry pi/esp32 - s2. there has been so much progress this year and I cannot wait to see what comes next.

Thank you for all the hard work, it is appreciated by all
 
Back
Top