Join Us and become a Member for a Verified Badge to access private areas with the latest PS4 PKGs.
PS4 CFW and Hacks       Thread starter PSXHAX       Start date Oct 26, 2017 at 10:37 PM       153      
Status
Not open for further replies.
Inspired by the recent PS4 Webkit Exploit Local Server tutorial, @Al Azif shared a script to cover many of the steps in the guide and has since updated the Easy PS4 Exploit Hosting Tool releasing on Github for those seeking to host their own PS4 Webkit Exploit page on LAN since Sony started blocking them. :geek:

Easy PS4 Exploit Hosting Tool Download: ps4-exploit-host.zip / GIT / PS4 Exploit Host Menu (for those who don't want to host their own) / Exploits Folder Browser / PS4 Exploit Host for OpenWRT by irefuse

To quote from the README.md: PS4 Exploit Host

What is this?


This is an easy way for anyone to host their own exploit for the PS4 on their LAN. It blocks PSN to stop accidental updates, it also serves the 4.05 update if you want it to. You can also generate an FTP payload. There is also a simple CLI for sending additional payloads.

So the scope of this has become like an all in one toolkit.

Requirements
  • Python 2 (Tested on 2.7.14)
  • The Python Directory added to your System Path Environment Variable (Windows Only)
  • This should run on Windows, OSX, and Linux (Tested on Windows 7, Windows 10, and Ubuntu 16.04)
How to download
  • Download the zip on the releases page
  • Download with Git, be sure to grab the submodules
How to run
  1. Run python start.py from the command line
    • If it starts with no errors, note the IP given to you
  2. On your PS4 use the noted IP as your DNS server
  3. On your PS4, go to Settings > User Guide and select it. Boom, the exploit page should load.
  4. When you're done use Crtl+C to cleanly close the script
Contributing

You can check the issue tracker for my to do list and/or bugs. Feel free to send a pull request for whatever. Be sure to report any bugs, include as much information as possible.

What if a new exploit is released?

You should just be able to replace the exploit files in the "exploit" folder.

Credits
Here are some other PS4-related Tweets making their rounds today:

Spoiler

Download: PS4-BETA-1.50-PS4UPDATE.PUP (307.9 MB) / PS4-BETA1-2.50-PS4UPDATE.PUP (233.6 MB) / PS4-BETA2-3.50-PS4UPDATE.PUP (286.5 MB) / PS4-BETA3-4.00-PS4UPDATE.PUP (297.8 MB)
Host Your Own Webkit Exploit & Jailbreak 4.05 Firmware PS4
How to Host the 4.55/4.05 Exploit Locally
Hosting PS4 5.05 Exploit Locally + Adding custom payloads (5.05 Jailbreak)
Hosting 5.05 Exploit Offline (PS4 Jailbreak)
How To Setup Al Azif DNS For Your PlayStation 4 And Run Any Payload Offline!
Cheers to @hyndrid, @SSShowmik and @Wultra for the Easy PS4 Exploit Hosting Tool news tips in the PSXHAX Shoutbox earlier today! (y)
Host Your Own PS4 Webkit Exploit Page on LAN by Al-Azif.jpg
 

Comments

Ive had success with the latest version (0.4.1) and lamance .61. Using this host setup locally I launch HEN from the PS4 guide then close it.

Go back and select ORIGINAL which gives me a list in the host console on my pc and then select lamance (which i put into the payloads folder myself) I had issues last version but this one has worked fine loading HEN then an additional payload.
 
hi! I want to buy a ps4 pro. For running games i need to run the same steps like normal ps4? do you now which revision are most likely to have an old firmware? sorry for my english
 
Since the previous revision, here are some more PS4 Exploit Host updates via Github today:

v0.4.2

Assets
Changelog
  • Javascript/OSX Error fix by alu0100845235
  • Switched #!/usr/bin/python3 back to #!/usr/bin/env python3 by artik
  • auto_exploit fix by MoserB
  • Added HTTP_Port and Root_Check setting by arioko
  • Added version in menu header by arioko
  • Renamed Interface setting to Interface_IP requested by JanJastrow
  • Added --settings arg to specify settings.json file location requested by xeroxmalf#7646
  • Updated README.md
  • Added FAQ.md
  • Add Host_Version into data javascript object to use in themes
  • Add Lang_Code into data javascript object, if available, to use in themes
  • Attempt to detect spoofer with default theme (New included HEN uses 5.51 spoofer... since 5.51 doesn't exist, yet, it's mapped to 4.55, likewise 5.05 is mapped to 4.05 as the full UA for 5.05 is blocked by default so if 5.05 is able to access the page it's actually 4.05, be aware 4.05 support is dropped)
  • Fixed issue with menu not reopening after selecting "Don't send a payload"
  • Renamed DNS_Rules['Pass_Through'] setting to DNS_Rules['Pass_Through_IP']
  • Renamed DNS_Rules['Self'] setting to DNS_Rules['Redirect']
  • Added DNS_Rules['Redirect_IP'] to settings
  • Removed warning on empty setting, the default, for Interface_IP
  • Remove unused patch payload function
  • Updated/Added payloads
  • Removed majority of 4.05 payloads from release
  • Add alias for URL http://the.gate while using DNS (Project likely being renamed due to the next bullets in this list and the announcement)
  • Nintendo Switch (3.0.0) support (Mostly Untested)
    • Block Updates with DNS
    • Redirect connection test
    • No exploit included (nx-hbexploit in next release)
  • PlayStation Vita (3.60) Support (Mostly Untested)
    • Blocks updates with DNS
    • Redirect User's Manual
    • Updater support
    • No exploit included (Henkaku in next release)
  • More console support pending
  • Removed some update settings... I'll build a standalone update deleter or something
  • THE UPDATER NO LONGER CHECKS MD5 CHECKSUMS
:arrow: PS4 ModChip Project for Webkit Exploits (ESP8266 Method) by Al Azif
 
when i use Hen folder (copy to my pendrive) from Al Azif v0.4.2 exploit load fast and without errors. But my games loading very long.

And when i try to close some game after playing it's closing and closing and don't stop... :unsure: anybody have same issue ? I have PS4 Pro with 4.55...
 
Has anyone tried The apptousb.bin from The latent Update? I cant make it work. Im surpose to have The .ini file in usb/PS4 folder right? I unchecked CHECKUSB and move but nothing happens. Anyone else having problems?
 
Has anybody got this working on Linux ?

I'm trying to get this running on a really old PC running Lubuntu 16.04 LTS (32 bit). Python is already installed, when I extract the files to a folder in my downloads it asks what I want to open the executable with, I tried terminal but nothing happens.

Any ideas ?, I'm not a total linux noob but Ill admit I usually rely on the Ubuntu store or .deb files to install programs.

Thanks in advance.
 
Following the last revision, here's the latest PS4 Exploit Host v0.4.2 updated for 5.0.5 - Last change at 4:30am UTC on May 28th via Github:

Assets
UPDATED FOR 5.05
Last change at 4:30am UTC on May 28th

Changelog
  • Javascript/OSX Error fix by @alu0100845235
  • Switched #!/usr/bin/python3 back to #!/usr/bin/env python3 by @artik
  • auto_exploit fix by @MoserB
  • Added HTTP_Port and Root_Check setting by @arioko
  • Added version in menu header by @arioko
  • Renamed Interface setting to Interface_IP requested by @JanJastrow
  • Added --settings arg to specify settings.json file location requested by xeroxmalf#7646
  • Updated README.md
  • Added FAQ.md
  • Add Host_Version into data javascript object to use in themes
  • Add Lang_Code into data javascript object, if available, to use in themes
  • Attempt to detect spoofer with default theme (New included HEN uses 5.51 spoofer... since 5.51 doesn't exist, yet, it's mapped to 4.55, likewise 5.05 is mapped to 4.05 as the full UA for 5.05 is blocked by default so if 5.05 is able to access the page it's actually 4.05, be aware 4.05 support is dropped)
  • Fixed issue with menu not reopening after selecting "Don't send a payload"
  • Renamed DNS_Rules['Pass_Through'] setting to DNS_Rules['Pass_Through_IP']
  • Renamed DNS_Rules['Self'] setting to DNS_Rules['Redirect']
  • Added DNS_Rules['Redirect_IP'] to settings
  • Removed warning on empty setting, the default, for Interface_IP
  • Remove unused patch payload function
  • Updated/Added payloads
  • Removed majority of 4.05 payloads from release
  • Add alias for URL http://the.gate while using DNS (Project likely being renamed due to the next bullets in this list and the announcement)
  • Nintendo Switch (3.0.0) support (Mostly Untested)
    • Block Updates with DNS
    • Redirect connection test
    • No exploit included (nx-hbexploit in next release)
  • PlayStation Vita (3.60) Support (Mostly Untested)
    • Blocks updates with DNS
    • Redirect User's Manual
    • Updater support
    • No exploit included (Henkaku in next release)
  • More console support pending
  • Removed some update settings... I'll build a standalone update deleter or something
  • THE UPDATER NO LONGER CHECKS MD5 CHECKSUMS
From Pastebin.com:
Code:
{
    "Interface_IP": "",
    "Debug": false,
    "DNS": true,
    "HTTP": true,
    "HTTP_Port": 80,
    "Root_Check": true,
    "Theme": "default",
    "Auto_Exploit": "",
    "Auto_Payload": "",
    "DNS_Rules": {
        "Redirect_IP": "",
        "Redirect": [
            "the.gate",
            "www.playstation.com",
            "manuals.playstation.net",
            "(get|post).net.playstation.net",
            "(d|f|h)[a-z]{2}01.(ps4|psp2).update.playstation.net",
            "update.playstation.net",
            "gs2.ww.prod.dl.playstation.net",
            "ctest.cdn.nintendo.net"
        ],
        "Block": [
            ".*.207.net",
            ".*.akadns.net",
            ".*.akamai.net",
            ".*.akamaiedge.net",
            ".*.cddbp.net",
            ".*.ea.com",
            ".*.edgekey.net",
            ".*.edgesuite.net",
            ".*.llnwd.net",
            ".*.playstation.(com|net|org)",
            ".*.ribob01.net",
            ".*.sbdnpd.com",
            ".*.scea.com",
            ".*.sonyentertainmentnetwork.com",
            "sun.hac.lp1.d4c.nintendo.net",
            "beach.hac.lp1.eshop.nintendo.net",
            "atum.hac.lp1.d4c.nintendo.net",
            "atumn.hac.lp1.d4c.nintendo.net",
            "aqua.hac.lp1.d4c.nintendo.net",
            "receive-lp1.(dg|er).srv.nintendo.net"
        ],
        "Pass_Through_IP": []
    },
    "UA_Check": true,
    "Valid_UA": [
        "Mozilla/5.0 (PlayStation 4 1.01) AppleWebKit/536.26 (KHTML, like Gecko)",
        "Mozilla/5.0 (PlayStation 4 1.76) AppleWebKit/536.26 (KHTML, like Gecko)",
        "Mozilla/5.0 (PlayStation 4 4.05) AppleWebKit/537.78 (KHTML, like Gecko)",
        "Mozilla/5.0 (PlayStation 4 5.05) AppleWebKit/537.78 (KHTML, like Gecko)",
        "Mozilla/5.0 (PlayStation 4 4.55) AppleWebKit/601.2 (KHTML, like Gecko)",
        "Mozilla/5.0 (PlayStation 4 5.51) AppleWebKit/601.2 (KHTML, like Gecko)",
        "Mozilla/5.0 (PlayStation 4 5.05) AppleWebKit/601.2 (KHTML, like Gecko)",
        "Mozilla/5.0 (PlayStation Vita 3.60) AppleWebKit/537.73 (KHTML, like Gecko) Silk/3.2",
        "Mozilla/5.0 (PlayStation Vita 3.67) AppleWebKit/537.73 (KHTML, like Gecko) Silk/3.2",
        "Mozilla/5.0 (Nintendo Switch; WebApplet) AppleWebKit/601.6 (KHTML, like Gecko) NF/4.0.0.6.9 NintendoBrowser/5.1.0.14936"
    ],
    "Update": {
        "PS4_No_Update": 1.76,
        "Vita_No_Update": 3.60
    }
}
 
Status
Not open for further replies.
Back
Top