A few hours ahead of the HENkaku release, hacker Yifanlu taunted the scene, asking “worthy hackers” to reverse engineer the HENkaku exploit and figure it out. He promised a prize and more details to come.
8 hours to go. Might be asleep when it drops. We challenge any worthy hacker to reverse our stuff and figure it out. A big prize awaits 😉
Now that the exploit is out, you have a shot at it.
You can access and investigate the exploit by accessing the official site (and its now famous install button) here. I personally don’t have the *cough* skills *cough* time to look into it myself, but it should be an interesting challenge for people with the right set of skills. (jeez, not you Liam Neeson, how many times do I have to tell you?)
Little is known about the HENkaku exploit, except that it relies at least on a Webkit vulnerability that was provided to team molecule by “an anonymous contributor”.
With that being said, famous PSP/PS3 hacker Mathieulh, and hacker 173210 have already been sharing some of the secrets of the HENkaku exploit as they apparently accepted the challenge:
Hackers will not be the only ones trying to Reverse Engineer the #HENkaku exploit. Since this opens the PSVita to unsigned code on its latest firmware 3.60, it is likely Sony engineers are already looking at ways to understand the bug and patch it. Or, at least, at a quick way to upgrade their Webkit implementation with a patch for the vulnerability.