Proceeding his FontFaceSet Vulnerability PoC, PS4 9.00 Userland / WebKit Entry Point and the 9.00 PS4 Jailbreak POOBS4 Exploit yesterday PS4 Scene developer @sleirsgoevy (Github) shared on Twitter some serve_img.sh / unserve_img.sh scripts to enable mass storage emulation on rooted Android Samsung phones to emulate plugging / unplugging the device for those seeking to avoid using a physical USB drive.
Inserting / removing the fake drive at the right time has been tested successfully on a Samsung A6 and Samsung J3 Pro among other rooted Android mobile devices that are able to emulate USB drives in the Tweets below, and he also notes you can try using DriveDroid or USB Mountr apps as well.
Below are some more Droid-related articles sorted by date with the oldest first for those interested, and from gist.github.com:
[B]serve_img.sh[/B]:
[B]unserve_img.sh[/B]:
Inserting / removing the fake drive at the right time has been tested successfully on a Samsung A6 and Samsung J3 Pro among other rooted Android mobile devices that are able to emulate USB drives in the Tweets below, and he also notes you can try using DriveDroid or USB Mountr apps as well.
Below are some more Droid-related articles sorted by date with the oldest first for those interested, and from gist.github.com:
- How to Host PS4HEN on Android Phone Guide
- PlayStation 4 Payload Injector APK for Android
- PS4 Payload Sender APK for Android
- Android App to Host PS4 Exploit and Payloads
- PS4 Payload Sender Signed APK Update
- xPloitServer: Persistent Android Webserver for X-Project
- PS4 ELF / Payload Injectors & Payload Loaders
- Android PS4 Exploit Host Server APK File
- PS4 Tool Box Backwards Compatible with PS4 Payloads
- PS4 Payload Sender Homebrew App
[B]serve_img.sh[/B]:
Code:
A=/sys/class/android_usb/android0
set -x
killall -STOP adbd
sleep 1
echo 0 > $A/enable
echo mass_storage > $A/functions
echo disk > $A/f_mass_storage/luns
echo 1 > $A/enable
sleep 1
echo 0 > $A/enable
echo "$1" > $A/f_mass_storage/lun0/file
echo 1 > $A/enable
Code:
A=/sys/class/android_usb/android0
set -x
echo 0 > $A/enable
echo mtp,acm,ffs > $A/functions
echo 1 > $A/enable
killall -CONT adbd