Yeah, if it was a real "webkit exploit" the news would not be emulators running on it, it would be that another entry point into userspace has been found.
I think you Are confusing my posts to yours as you clearly have no basic knowledge on anything and post random shit out of nowhere based on person even the info was important and from reialble source,like last time.
Just stop,stop embarrassing yourself further,you don't even know what you even remotely talking about.
Did I ever claimed it to be kernel exploit ? Don't think so.
At least I bring news,even for simple homebrew stuff
as every progress is a step
You don't seems to have even opinion of your own.
"Fuck Denuvo"
Your personal opinions != the rest of the forum
Last edited by JackQ on Fri, 29th Jul 2016 09:53; edited 2 times in total
because JackQ will eventually copy paste this news, I actually think this is some progress, although they might have been able to dump this from 1.76 system.
That being said, it's DriveClub ALPHA version which would lead to a dump from a debug unit.
That being said again, even on a debug unit, there is no way to obtain a RIFKEY without a kernel exploit.
So there is somewhere some exploit out there, not that we didn't know
Proof of concept webkit exploit running on PS4 firmwares 2.xx
Developer Fire30 released a webkit exploit proof of concept for the PS4, ported from a webkit heap buffer overflow revealed in 2014. I haven’t tested this myself, and this is still unconfirmed information at this point.
Fire30 says the exploit should run on any PS4 firmware below 2.50, although he mentions parts of the exploit implementation will only work on firmware 2.03, presumably because this is the firmware he’s using to write the code.
There’s not much to be said about this at this point, although in theory the kernel exploits BadIRET and dlclose could be ported to this exploit, if confirmed legit: it has been mentioned these kernel exploits are compatible up to firmware 2.xx, and the only thing preventing those from being used on any other firmware than 1.76 so far was because the only publicly available userland exploit has been the 1,76 webkit exploit.
A port of the dlclose exploit to this new webkit vulnerability could bring some Linux joy to more PS4 users, and help decrease the current asking price for hackable PS4s.
nice to see faster progression now, even if its only little things. one of those will lead to break this fucker up wide open like an east european prostitute
whoop whoop,cturt managed to unlock the dev menu from ps4 devkits on normal ps4s with 1.74 firmware using the old exploit. ofc it doenst allow you to use the packet manager of it to run games etc, but it may lead to other great options
if you are still on 1.76, enable NPDRM Clock debug, it will stay on forever even if you update, and allows you to keep PS+ games forever by changing the date, even if you are unsubscribed (and play any expired contents but AFAIK only PS+ games are limited).
We talked a few days ago about a patch to the dlclose PS4 exploit, that lets people access Debug settings on a retail PS4. (This runs through the dlclose exploit of course, meaning you need to have a PS4 running on 1.76 firmware).
It’s also been mentioned that these debug settings were a subset of those available to actual PS4 Devkits.
However it seems the additional Debug settings from Devkit PS4 can also be enabled through this patch. User lezek20 over at playstationhax.it claims he’s been able to do it.
This hasn’t been confirmed yet, and lezek20 hasn’t released any information on how to proceed. It’s unclear if there’s any code involved at all, or if it’s some other clever trick to “unlock” those.
Developer Hitodama updated the PS4 native toolchain yesterday to add support for Kernel elf loading in the elf loader tool.
Typically, a process/binary running in kernel mode has more access than a “normal” process. This could mean access to more RAM in some cases, or functions that could help optimize speed, or simply being able to do things a normal process would not be able to (in the PSP world this included the possibility to spawn plugins on top of homebrews, for example)
The Native PS4 SDK and associated tools will only work if you have a PS4 running firmware 1.76 currently. This is not a limitation of the tools themselves, but running your own code on the PS4 today requires a combination of exploit + privilege escalation (kernel exploit). This combination today is limited by the only publicly know userland exploit, a Webkit exploit running on firmware 1.76.
PS4 Jailbreak 2016
Some users are leveraging the firmware 1.76 hack to run linux on their PS4, while other hackers are hard at work to run native tools and utilities through the exploits. The PS4 SDK is a critical piece, in both cases.
Rumors of hacker qwertyoruiop having a Proof of Concept Webkit exploit for the PS4 started to ignite the scene earlier today.
Playstationhax report that the hacker’s recent work on a use after free Webkit exploit is compatible with the PS4. The author on playstationhax (whom I have to assume is GregoryRasputin?) implies that the exploit works on the PS4, on the latest firmware 3.50.
Qwertyoruiop himself hasn’t been so specific. On twitter, he actually seemed to say he wasn’t sure if the exploit would actually work on the PS4 or not. Apparently, the code does crash the PS4, but it’s not guaranteed, based on the hacker’s post, if the crash is exploitable or not:
Follow
qwertyoruiop @qwertyoruiopz
also bug seems to trigger on ps4- but it's impossible to distinguish between OOM and segfault on ps4 :/
1:25 PM - 20 May 2016
2 2 Retweets 11 11 likes
Qwertyoruiop is a trusted dev of the iPhone hacking scene, and has also been credited in the past for helping CTurt on the PS4 kernel exploits.
Some details on the vulnerability are publicly available on the webkit github, so people with the right sets of skills could be able to confirm if this works. A successful approach might be to try the exploit on firmware 1.76 where some (albeit limited) debug tools exist, to avoid having to work on a proof of concept in the dark directly for 3.50.
Can the recently released PS Vita webkit exploit be ported to the PS4?
Quote:
About a week ago, Yifanlu and Team molecule defibrillated the Vita scene with the release of HENkaku, bringing homebrews and emulators to all PS Vita owners of the latest firmware 3.60.
HENkaku relies, in part, on a Webkit exploit, which could potentially be ported to the PS4.
This wouldn’t be the first time. The first webkit exploit on the Vita was subsequently ported to the PS4 in 2014, and is currently used to power PS4 Native hacks on firmware 1.76.
As a matter of fact, several trusted sources (whom I’ll assume for now want to stay anonymous) have confirmed to me that a port of this new webkit exploit has already been made and is operational on the PS4.
Of course, the Webkit exploit is just a usermode entry point and does not paint the whole picture (neither does it on the PS Vita! As we’ve seen recently, HENkaku is a challenging piece of software). To do cool things such as installing linux on your PS4 or run native homebrews, you’ll also need kernel access. On the PS4 1.76 this is achieved through either the dlclose exploit or the BadIRET exploit.
Releasing a Webkit exploit on the PS4 now would probably be seen as useless as it would only give limited access to the console. It’s likely that anyone who ports the Webkit exploit to the PS4 will be waiting for a kernel exploit to show up before releasing anything. Sadly, those don’t come often, which is why most people have been trying to get a 1.76 PS4.
Given the upcoming PS4 4.0 Beta, I’m looking forward to seeing if Sony will patch this new webkit bug in the PS4 ahead of the new firmware revision. People looking for a PS4 exploit and who cannot get their hands on a PS4 1.76 might want to not update too soon…
CVE-2014-1303
Pictured: a webkit in exploit in the wild. A pretty common sight in the 21st century.
More hacks coming to the PS4?
In parallel to this Webkit adventure, it will be interesting to see if the Vita leads us to more knowledge of the PS4. The two systems are vastly different, but they are tightly coupled. The hack of the PS3 led to the ultimate demise of the PSP security. The full hack of the 3DS revealed essential keys used on the Wii U. Do possibilities like this exist in the interaction between the PS Vita and the PS4? Time will tell.
Are you waiting for a PS4 exploit, or will you update to 4.0 straight away?
oh , btw this is the worlds first fully decrypted ps4 game.
All selfs and sprx files were kindly given to us by leprechaun's.
Ps4 scene is alive and well secrets were meant to be kept "
It's called "Cat and mouse" game.. like we are having on everywhere on the scene from 3DS to PC's games...
Full article :
Quote:
Warez group E-Peen claim to have released the first fully decrypted PS4 game, FIFA 14.
There is no publicly known way to run decrypted games on the PS4 at the moment, and the only available PS4 jailbreak is for consoles running firmware 1.76. This means there is no obvious way to actually test and confirm the release is working.
Nevertheless, some users have been able to confirm this looks legit. User Haryoke confirmed the eboot.bin file (the game’s main binary) appears to be decrypted.
Spoiler:
harryoke @harryoke1973
Fifa 14 - epeen is indeed decrypted HOLY SHITBALLS!!! #epeen
1:40 PM - 10 Sep 2016
4 4 Retweets 7 7 likes
The full release NFO uses pretty explicit language so I’ll refrain from posting it here. E-Peen are mentioning that they work with people who do not leak their secrets, and that the PS4 scene is alive:
Quote:
oh , btw this is the worlds first fully decrypted ps4 game.
All selfs and sprx files were kindly given to us by leprechaun’s.
Ps4 scene is alive and well
We’ve seen early warez releases on the PS Vita scene. These releases for the major part turned out to be useless because they were not fully decrypted, or in general got overthrown by game dumping tools such as Vitamin. Just because this release might be legit doesn’t mean anyone will actually ever have a use for it, depending on how the PS4 scene evolves.
There is no known jailbreak on the latest firmware 3.55, as the only publicly known hack on PS4 3.55 is a (user mode) Webkit exploit. With PS4 4.00 right around the corner and no PS4 Jailbreak in sight for the latest firmware, it’s a bit hard to agree with the concept of the “alive scene” the group is referring to in their announce.
You misunderstood,I meant to say that every major platform these days we have to deal with anti-pieacy efforts and updated protection and with that counter measures.. I wasn't meant to start aruging whatever this will help future JB or not..
I will wait for more PS4 news and progress for that,but for now it would be pointless..
It's disappointing isn't it - not just PS4 but all round now with denuvo badly affecting scene over on PC.
For someone who hasn't really encountered this kind of thing in any generation going back to spectrum days it's a bit of a shock to the system these last couple of years
Sony might patch the public userland exploit that exist for 3.55 that might be useful once krenel one will be out, so I would stay on lowest as possible until hackers confirm it safe...
Signature/Avatar nuking: none (can be changed in your profile)
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum