Join Us and become a Member for a Verified Badge on Discord to access private areas with the latest PS4 PKGs.
PS4 CFW and Hacks       Thread starter PSXHAX       Start date Mar 31, 2017 at 9:53 PM       6,061       6      
Status
Not open for further replies.
Following his previous PS4 Hacking work and the recent JailbreakMe PS4 4.0x exploit, PlayStation 4 homebrew developer @CTurt (Twitter) updated his open-source PS4 *** with the most recent commit details below. :ninja:

Download: PS4-***-master.zip / PS4 *** GIT (CTurt) / ****** GIT (Hitodama) / MSYS64.7z (51.9 MB) / MSYS64-beta2.7z (51.9 MB) / MSYS64-beta3.7z (51.9 MB)

Update libc.h
Code:
libPS4/include/libc.h

@@ -60,5 +60,6 @@ extern size_t (*fwrite)(const void * ptr, size_t size, size_t count, FILE *strea
 extern int (*fseek)(FILE *stream, long int offset, int origin);
 extern long int(*ftell)(FILE *stream);
 extern int (*fclose)(FILE *stream);
+extern int (*fprintf)(FILE *stream, const char *format, ...);
 
 void initLibc(void);
Update libc.c
Code:
libPS4/source/libc.c

@@ -53,6 +53,7 @@ size_t (*fwrite)(const void * ptr, size_t size, size_t count, FILE *stream );
 int (*fseek)(FILE *stream, long int offset, int origin);
 long int(*ftell)(FILE *stream);
 int (*fclose)(FILE *stream);
+int (*fprintf)(FILE *stream, const char *format, ...);
 
 void initLibc(void) {
     int libc = sceKernelLoadStartModule("libSceLibcInternal.sprx", 0, NULL, 0, 0, 0);
@@ -108,4 +109,5 @@ void initLibc(void) {
     RESOLVE(libc, fseek);
     RESOLVE(libc, ftell);
     RESOLVE(libc, fclose);
+    RESOLVE(libc, fprintf);
 }
Cheers to @mcmrc1 in the PSXHAX Shoutbox and @oneman123 for sharing the news on Twitter! (y)
PS4 *** Updated by PlayStation 4 Homebrew Developer CTurt.jpg
 

Comments

bombob

Lets work it out
Senior Member
Contributor
Verified
Thats what I'm talking about. Let us all forget about the misadventures of @racer0018. This is how real devs do.
No teasing, just hard cold evidence :bananaman:
 

bombob

Lets work it out
Senior Member
Contributor
Verified
So now we have read write access via webkit exploit. I think it wont be long before a proper kernel exploit is achieved.
 
Status
Not open for further replies.

:fire: Latest Help Topics

Top