I had access only to app0, sa0 and savedata0 partitions. vs0 can also be accessed?Xeeynamo wrote:It's possible but it's useless. SceWebKit process can read only from app0, savedata0 and vs0 but it can write only on savedata0 due to its user-mode privileges. We need a kernel exploit in order to access in r/w on more partitions. Also, the current dumps saves data from RAM, not from NAND.niszczycielnpc wrote:Can we only retrive files from ps vita of can we send files too?
Correct me if I'm in wrong with something.
vitasploit - Exploitation Framework
Forum rules
Forum rule Nº 15 is strictly enforced in this subforum.
Forum rule Nº 15 is strictly enforced in this subforum.
Re: vitasploit - Exploitation Framework
Advertising
- niszczycielnpc
- Posts: 259
- Joined: Thu Dec 19, 2013 12:10 pm
- Location: %appdata%/Poland/Netherland
Re: vitasploit - Exploitation Framework
Can we use in webkit exploit the same thing as tomtomdu does with "pspemu full control via webbrowser" of is it removed in ofw's higher than 3.01?
Advertising
My Devices [spoiler]PSVITA BLACK 3.50 - private exploit/color]
PLAYSTATION 4 OFW
PSP BLACK-1004 3.90 M33-2
XBOX 360 RGH JASPER
SAMSUNG GALAXY S 7 EDGE ROOTED
SAMSUNG GALAXY S ADVANCE ROOTED
NOKIA LUMIA 520[/spoiler]
PLAYSTATION 4 OFW
PSP BLACK-1004 3.90 M33-2
XBOX 360 RGH JASPER
SAMSUNG GALAXY S 7 EDGE ROOTED
SAMSUNG GALAXY S ADVANCE ROOTED
NOKIA LUMIA 520[/spoiler]
-
BATMAN-787
- Posts: 33
- Joined: Sun Oct 07, 2012 9:38 pm
Re: vitasploit - Exploitation Framework
no progress for 3.18 yet?
Re: vitasploit - Exploitation Framework
This works fine on 3.18.BATMAN-787 wrote:no progress for 3.18 yet?
Re: vitasploit - Exploitation Framework
app0:/eboot.bin is an encrypted SELF right? It's known where the executable is located in RAM? 'cause I cannot find it. At 0x18 of the eboot.bin I found 0x0001A678 (located in SCE header section) and at 0xB8 I found 0x00012e68 (located in ELF header section) but they point to nothing if I sum them to 0x8x000000.
-
BATMAN-787
- Posts: 33
- Joined: Sun Oct 07, 2012 9:38 pm
Re: vitasploit - Exploitation Framework
so is it to poke around or it will let you r/w something?Netrix wrote:This works fine on 3.18.BATMAN-787 wrote:no progress for 3.18 yet?
Re: vitasploit - Exploitation Framework
new revision of vitasploit:
https://github.com/Hykem/vitasploit/com ... 15bbd8aedbImproved exploit's success rate
Implemented custom struct handling.
Improved module loading functions.
Added new sample functions.
My sig is original 
Re: vitasploit - Exploitation Framework
Just pushed a couple more changes. Thanks to Netrix, the exploit's success rate has improved (avoids trashing the memory heap allowing a more predictable behavior) and it now supports basic struct handling (based on js-struct.js).
I've improved the module loading functions (you can now list/dump each module individually, e.g.: list_modules("SceLibc", true)), added loading of a new module SceCommonDialogMain (needed parameters just like ScePaf), corrected ScePaf loading parameters and implemented a path conversion test function to handle the "vs0:data/external/webcore" path.
Some modules were dependent on SceCommonDialogMain, so try using load_sysmodules1() and load_sysmodules2() to see which ones can be dumped now.
It's not clear were the executables get loaded, but try looking into some of the .suprx files that can be retrieved from this path and compare the offsets in their headers with their location in the RAM.
I've improved the module loading functions (you can now list/dump each module individually, e.g.: list_modules("SceLibc", true)), added loading of a new module SceCommonDialogMain (needed parameters just like ScePaf), corrected ScePaf loading parameters and implemented a path conversion test function to handle the "vs0:data/external/webcore" path.
Some modules were dependent on SceCommonDialogMain, so try using load_sysmodules1() and load_sysmodules2() to see which ones can be dumped now.
Use the new convert_path function to see how the WebKit application maps itself. Uncomment the "Directory listing test" and it will now list the WebKit's directory in addition to the "app0:" path.Xeeynamo wrote:app0:/eboot.bin is an encrypted SELF right? It's known where the executable is located in RAM? 'cause I cannot find it. At 0x18 of the eboot.bin I found 0x0001A678 (located in SCE header section) and at 0xB8 I found 0x00012e68 (located in ELF header section) but they point to nothing if I sum them to 0x8x000000.
It's not clear were the executables get loaded, but try looking into some of the .suprx files that can be retrieved from this path and compare the offsets in their headers with their location in the RAM.
You can do plenty with this on 3.18, including memory reading, module dumping and support URI calls.BATMAN-787 wrote:so is it to poke around or it will let you r/w something?Netrix wrote:This works fine on 3.18.BATMAN-787 wrote:no progress for 3.18 yet?
-
BATMAN-787
- Posts: 33
- Joined: Sun Oct 07, 2012 9:38 pm
Re: vitasploit - Exploitation Framework
BATMAN-787 wrote:so is it to poke around or it will let you r/w something?Netrix wrote:This works fine on 3.18.BATMAN-787 wrote:no progress for 3.18 yet?
so lets say i get my hands on this and somehow i get to the point where everyone can see the path of theHykem wrote:You can do plenty with this on 3.18, including memory reading, module dumping and support URI calls.
web-browser bubble app and somehow magically someones figures how to read/write a new path which will allow you to
place/or put files in there and i wanted to reach that point but im using a incompatible operating system, because mainly
everything is made windows based how will i be able to reach that ideological point by been a mac user.
Re: vitasploit - Exploitation Framework
new revision of vitasploit, with some extra added tests.
https://github.com/Hykem/vitasploit/com ... 0a291e7f05
https://github.com/Hykem/vitasploit/com ... 0a291e7f05
My sig is original 

