YifanLu: “Yes, it’s a kernel exploit!”, and more explanations about HENkaku
A few weeks ago, developer Yifanlu, (one of the members of Team molecule behind the PS Vita 3.60 hack HENkaku), challenged hackers to reverse engineer the Henkaku exploit. The explicit goal of this challenge is to force hackers to take some interest into the PS Vita’s security, which Yifan claims is one of the strongest he’s seen on a consumer device.
St4rk, whom we’ve mentioned recently for his contribution to VitaDump, has been reverse engineering HENkaku and posted some details on his findings, on his blog here. It’s a great read because he doesn’t only explain what he’s found so far, but also how he proceeded to find it. Extremely educative.
As people progress on the reverse engineering of Henkaku, team molecule are keeping their promise of releasing more source code and explaining more of the hack. Team molecule’s Xyz recently explained the PSV 3.60/PS4 3.55 Webkit hack, and a few days ago also explained how the Offline version of HENkaku works. Furthermore, Team molecule have released the source code of stage 2 of the Henkaku chain.
For those of you interested in understanding how these things work, the explanations from xyz, St4rk, and Yifanlu are all very relevant. Give them a read!