Join Us and become a Member for a Verified Badge to access private areas with the latest PS4 PKGs.
PS4 CFW and Hacks       Thread starter PSXHAX       Start date Jul 6, 2018 at 11:34 PM       15      
Status
Not open for further replies.
Today justanormaldev made available a Github repository for PlayStation 4 developers dubbed PS4 Homebrew Vagrant for 5.05 jailbroken consoles, which as the name implies is a vagrant box for homebrew (unsigned code) execution and development. :geek:

Download: ps4-homebrew-vagrant-master.zip / GIT

According to Wikipedia, vagrant is an open-source software product for building and maintaining portable virtual software development environments.

Here's some additional details from the README.md, to quote: PS4 homebrew vagrant

A vagrant box for PS4 homebrew execution and development

Currently only for 5.05

What this vagrantfile is intended to do

  • setup dependencies and build from source code on provision (minimum effort to get started)
  • serve as executable instructions on how to build the different projects
  • add utils to simplify usage
To get it running
To update to latest

Run vagrant destroy -fto remove everything from the previous version (more info: https://www.vagrantup.com/intro/getting-started/teardown.html) other than what you placed on the /vagrant path (more info: https://www.vagrantup.com/intro/getting-started/synced_folders.html).

Then you can follow the same steps as in the To get it running section.

What you can do with this

After you've got it running and are inside an ssh session to it, you will be able to see the following directories in the home path:
Code:
vagrant@ubuntu-xenial:~$ ls
exploit  hen  jkpatch  ps4-payload-***
Exploit

Contains Cryptogenic's browser exploit (https://github.com/justanormaldev/ps4-homebrew-vagrant/blob/master/Vagrantfile#L63).

The vagrant box has been configured to use the hen from the original source when running this exploit (https://github.com/justanormaldev/ps4-homebrew-vagrant/blob/master/Vagrantfile#L68)

Start server

You can start an HTTP server for it by running the serve.sh script inside this directory. The vagrant box is configured to use port 8080 on the same IP as the host machine (e.g: if the computer you're using has the IP 192.168.0.2 and the PS4 is on the same network, you can type in the PS4 browser: http://192.168.0.2:8080 to access it).
Code:
vagrant@ubuntu-xenial:~$ exploit/serve.sh
~/exploit ~
Serving HTTP on 0.0.0.0 port 8080 ...
10.0.2.2 - - [05/Jul/2018 22:07:30] "GET / HTTP/1.1" 200 -
10.0.2.2 - - [05/Jul/2018 22:07:30] "GET /rop.js HTTP/1.1" 200 -
10.0.2.2 - - [05/Jul/2018 22:07:30] "GET /syscalls.js HTTP/1.1" 200 -
10.0.2.2 - - [05/Jul/2018 22:07:30] "GET /expl.js HTTP/1.1" 200 -
10.0.2.2 - - [05/Jul/2018 22:07:30] "GET /userland.js HTTP/1.1" 200 -
10.0.2.2 - - [05/Jul/2018 22:07:30] "GET /homebrew.js HTTP/1.1" 200 -
10.0.2.2 - - [05/Jul/2018 22:07:30] "GET /mira.js HTTP/1.1" 200 -
HEN

Contains xvortex's homebrew enabler (aka hen) (https://github.com/justanormaldev/ps4-homebrew-vagrant/blob/master/Vagrantfile#L38).

Start server

You can start an HTTP server for it by running the serve.sh script inside this directory. The vagrant box is configured to use port 8080 on the same IP as the host machine (e.g: if the computer you're using has the IP 192.168.0.2 and the PS4 is on the same network, you can type in the PS4 browser: http://192.168.0.2:8080 to access it).
Code:
vagrant@ubuntu-xenial:~$ hen/serve.sh
~/hen/exploit ~
Serving HTTP on 0.0.0.0 port 8080 ...
10.0.2.2 - - [05/Jul/2018 22:17:10] "GET / HTTP/1.1" 200 -
Send Payload

If you're running the exploit and is Awaiting Payload, you can send it by running the send.sh script inside this directory. You can specify the PS4 IP using the environment variable PS4IP.
Code:
vagrant@ubuntu-xenial:~$ PS4IP=192.168.1.107 hen/send.sh
jkpatch

Contains withmetta's fork of the xemio's jkpatch (it is the one that seems to work properly for 5.05) (https://github.com/justanormaldev/ps4-homebrew-vagrant/blob/master/Vagrantfile#L52).

Send Payload

If you're running the exploit and is Awaiting Payload, you can send it by running the send.sh script inside this directory. You can specify the PS4 IP using the environment variable PS4IP.
Code:
vagrant@ubuntu-xenial:~$ PS4IP=192.168.1.107 jkpatch/send.sh
PS4 Homebrew Vagrant Box Execution & Development by Justanormaldev.jpg
 

Comments

Porting Movian to PS4 would be awesome! Now that the open source *** is available, hope Andreas would look into it or someone else would give a try at making the real media player for PS4.
 
Status
Not open for further replies.
Back
Top