Join Us and become a Member for a Verified Badge to access private areas with the latest PS4 PKGs.
PS4 CFW and Hacks       Thread starter PSXHAX       Start date Oct 26, 2017 at 10:37 PM       153      
Status
Not open for further replies.
Inspired by the recent PS4 Webkit Exploit Local Server tutorial, @Al Azif shared a script to cover many of the steps in the guide and has since updated the Easy PS4 Exploit Hosting Tool releasing on Github for those seeking to host their own PS4 Webkit Exploit page on LAN since Sony started blocking them. :geek:

Easy PS4 Exploit Hosting Tool Download: ps4-exploit-host.zip / GIT / PS4 Exploit Host Menu (for those who don't want to host their own) / Exploits Folder Browser / PS4 Exploit Host for OpenWRT by irefuse

To quote from the README.md: PS4 Exploit Host

What is this?


This is an easy way for anyone to host their own exploit for the PS4 on their LAN. It blocks PSN to stop accidental updates, it also serves the 4.05 update if you want it to. You can also generate an FTP payload. There is also a simple CLI for sending additional payloads.

So the scope of this has become like an all in one toolkit.

Requirements
  • Python 2 (Tested on 2.7.14)
  • The Python Directory added to your System Path Environment Variable (Windows Only)
  • This should run on Windows, OSX, and Linux (Tested on Windows 7, Windows 10, and Ubuntu 16.04)
How to download
  • Download the zip on the releases page
  • Download with Git, be sure to grab the submodules
How to run
  1. Run python start.py from the command line
    • If it starts with no errors, note the IP given to you
  2. On your PS4 use the noted IP as your DNS server
  3. On your PS4, go to Settings > User Guide and select it. Boom, the exploit page should load.
  4. When you're done use Crtl+C to cleanly close the script
Contributing

You can check the issue tracker for my to do list and/or bugs. Feel free to send a pull request for whatever. Be sure to report any bugs, include as much information as possible.

What if a new exploit is released?

You should just be able to replace the exploit files in the "exploit" folder.

Credits
Here are some other PS4-related Tweets making their rounds today:

Spoiler

Download: PS4-BETA-1.50-PS4UPDATE.PUP (307.9 MB) / PS4-BETA1-2.50-PS4UPDATE.PUP (233.6 MB) / PS4-BETA2-3.50-PS4UPDATE.PUP (286.5 MB) / PS4-BETA3-4.00-PS4UPDATE.PUP (297.8 MB)
Host Your Own Webkit Exploit & Jailbreak 4.05 Firmware PS4
How to Host the 4.55/4.05 Exploit Locally
Hosting PS4 5.05 Exploit Locally + Adding custom payloads (5.05 Jailbreak)
Hosting 5.05 Exploit Offline (PS4 Jailbreak)
How To Setup Al Azif DNS For Your PlayStation 4 And Run Any Payload Offline!
Cheers to @hyndrid, @SSShowmik and @Wultra for the Easy PS4 Exploit Hosting Tool news tips in the PSXHAX Shoutbox earlier today! (y)
Host Your Own PS4 Webkit Exploit Page on LAN by Al-Azif.jpg
 

Comments

@Al Azif cloning your site was just easier for me up to this point. Thanks again

@mschumacher69 i know! I have a spare router with openwrt on it and wired to my ps4. Cloning his site and putting it on the router made it the same as his DNS without ever being connected to any network. Only connected to network for FTP. Any way works this is just how I’ve be doing it. Thanks
 
Pre-release of host where all the HTML is outside of the program. Use /html/exploit.html to edit the main page. Store other files in /static/ and assume they are example.com/static/

I've included the current default page as an example about how to edit it.

https://anonfile.com/q0a7Fadcb5/ps4-exploit-host-win.zip

And here is a repo for submitting themes. I'm probably going to do like a theme of the week or something on the DNS.

https://github.com/Al-Azif/peh-themes
 
@Al Azif Yes, I actually did look at the files and they definitely aren't standard files created by the python runtime. I don't think there's a good reason for your exploit host to produce .net manifest files unless you're using something like pywinauto - but why would you be doing that?
 
@ruf3842
This is what you should see... if you have anything else it's something else on your computer adding those files. You can verify this on the "Behavior" tab on total if you wish.
  • VCRUNTIME140.dll
  • _bz2.pyd
  • _hashlib.pyd
  • _lzma.pyd
  • _socket.pyd
  • _ssl.pyd
  • ps4-exploit-host.exe.manifest
  • pyexpat.pyd
  • python36.dll
  • select.pyd
  • unicodedata.pyd
  • base_library.zip
What there is suspicious to you?
 
New v0.4.0 Pre-Release:

The one for 4.55
Pre-Release

No payloads included, only 455v2 included for exploits

CURRENTLY BUILDING, CHECK BACK LATER FOR YOUR BINARY IF IT'S NOT HERE YET
 
Status
Not open for further replies.
Back
Top