Release: updated fork of 4.05 PS4 Exploit by IDC, and ps4-exploit-host updated to 0.3.6.1
Given the current pace of the PS4 scene, this release is fairly old (it pretty much happened right after SpecterDev released his implementation of the exploit) but is quite important: Developer IDC has been working on a fork of SpecterDev’s exploit, and added significant modifications to it. From an end user’s perspective, the most visible change with this fork is that the FTP payload that’s been circulating (more on that in a follow up article) is granted full root access instead of being constrained to the webkit process permissions.
In IDC’s changelog compared to SpecterDev’s release:
- Modify loader to be fully relocatable.
- Move fix to its own file.
- Change memory allocation to behave similar to how 1.76 payloads ran.
- Improve overall stability in WebKit exploit:
- Add automatic prisonbreak (remove sandbox) and payload run loop.
- Revert to original payload address.
- Clear payload memory area before each run.
I think some of these changes are significant, in particular if they make the 4.05 exploit behave closer to the 1.76 one: most of the payloads that are circulating for now are directly inherited from the 1.76 scene, and simply recompiled with an updated SDK. Any changes can have an impact, and I would not be surprised if this is why the FTP server (recompiled from 1.76 version) was behaving strangely for some.
In other words, I do recommend to start using this fork for now, unless people come up with very good reasons not to.
For those of you who have been following my tutorial on how to hack your PS4 4.05, there’s also good news: Developer Al-Azif has been frenetically updating his awesome tool ps4-exploit-host, which is now at version 0.3.6.1. It ships with both SpecterDev and IDC’s versions of the exploits, and lets you choose which one you want to run. Ps4-exploit-host is the swiss army knife of PS4 4.05 hack, and I strongly recommend that you update (or get it for the first time if you haven’t used it yet). You’ll need Python 3 (formerly Python 2) in order to update the tool.
Download and run PS4 4.05 PS4 Exploit (IDC Fork)
Important: You need a PS4 running firmware 4.05 in order to use this exploit. If you have that, great! If you have a PS4 running a firmware lower than 4.05, see my tutorial on how to update your PS4 to Firmware 4.05. If you have a PS4 running a firmware higher than 4.05, you need to buy a PS4 with a lower firmware. Here are tips on how to find one.
For those who have been using ps4-exploit-host, just grab the latest version, which contains IDC’s exploit: you can download directly ps4-exploit-host (version 0.3.6.1 or higher) on Al-Azif’s github.
If you’d rather just get the exploit, you can fetch it from IDC’s github.
Stay tuned on on our PS4 Jailbreak page for more info on the PS4 4.05 Hack!
first!
I’m teh master of the galaxeeeeeeeeeeeeeeee!!!11!
Happy New Year to you smegmas below me. 😉
4.55 ftw!!! I hope to have it in 2018 😀 by the way happy new year to all readers!
Worx fine
I’m having an error when I try to excute the exploit. The ps4-exploit-host ask me which exploit I want to use (I choose “idc”), then I opened the User’s Guide and the tool ask me what payload I want to send to the PS4. No matter which payload send, when I sent it the User’s Guide give me an “exit code: 0” and ask me “Again?” to reload the web. But never works to me. What can I do? 🙁 Thanks in advance and sorry for my bad english :p
I get this problem for idc. specter works. Also, running specter after the failed IDC tells me “”Status: Kernel Patched!” so obviously the IDC managed to do something before it died, just not everything.
This would be cool as a Metasploit module 🙂
thanks for sharing