Advertising (This ad goes away for registered users. You can Login or Register)

vitasploit - Exploitation Framework

Open discussions on programming specifically for the PS Vita.
Forum rules
Forum rule Nº 15 is strictly enforced in this subforum.
addddd
Posts: 9
Joined: Fri Jun 28, 2013 4:14 am

Re: vitasploit - Exploitation Framework

Post by addddd » Thu Nov 20, 2014 8:33 pm

Xeeynamo wrote:
niszczycielnpc wrote:Can we only retrive files from ps vita of can we send files too?
It's possible but it's useless. SceWebKit process can read only from app0, savedata0 and vs0 but it can write only on savedata0 due to its user-mode privileges. We need a kernel exploit in order to access in r/w on more partitions. Also, the current dumps saves data from RAM, not from NAND.
Correct me if I'm in wrong with something.
I had access only to app0, sa0 and savedata0 partitions. vs0 can also be accessed?
Advertising

User avatar
niszczycielnpc
Posts: 259
Joined: Thu Dec 19, 2013 12:10 pm
Location: %appdata%/Poland/Netherland

Re: vitasploit - Exploitation Framework

Post by niszczycielnpc » Wed Nov 26, 2014 2:05 pm

Can we use in webkit exploit the same thing as tomtomdu does with "pspemu full control via webbrowser" of is it removed in ofw's higher than 3.01?
Advertising
My Devices [spoiler]PSVITA BLACK 3.50 - private exploit/color]
PLAYSTATION 4 OFW
PSP BLACK-1004 3.90 M33-2
XBOX 360 RGH JASPER
SAMSUNG GALAXY S 7 EDGE ROOTED
SAMSUNG GALAXY S ADVANCE ROOTED
NOKIA LUMIA 520[/spoiler]

BATMAN-787
Posts: 33
Joined: Sun Oct 07, 2012 9:38 pm

Re: vitasploit - Exploitation Framework

Post by BATMAN-787 » Wed Nov 26, 2014 2:45 pm

no progress for 3.18 yet?

Netrix
Posts: 82
Joined: Thu Jun 27, 2013 3:45 am

Re: vitasploit - Exploitation Framework

Post by Netrix » Sat Nov 29, 2014 4:47 pm

BATMAN-787 wrote:no progress for 3.18 yet?
This works fine on 3.18.

User avatar
Xeeynamo
Posts: 25
Joined: Fri Feb 24, 2012 6:33 pm
Location: Italy
Contact:

Re: vitasploit - Exploitation Framework

Post by Xeeynamo » Sat Nov 29, 2014 10:25 pm

app0:/eboot.bin is an encrypted SELF right? It's known where the executable is located in RAM? 'cause I cannot find it. At 0x18 of the eboot.bin I found 0x0001A678 (located in SCE header section) and at 0xB8 I found 0x00012e68 (located in ELF header section) but they point to nothing if I sum them to 0x8x000000.

BATMAN-787
Posts: 33
Joined: Sun Oct 07, 2012 9:38 pm

Re: vitasploit - Exploitation Framework

Post by BATMAN-787 » Sun Nov 30, 2014 7:35 pm

Netrix wrote:
BATMAN-787 wrote:no progress for 3.18 yet?
This works fine on 3.18.
so is it to poke around or it will let you r/w something?

User avatar
Zecoxao
Posts: 281
Joined: Mon Sep 27, 2010 7:27 pm

Re: vitasploit - Exploitation Framework

Post by Zecoxao » Sun Nov 30, 2014 9:56 pm

new revision of vitasploit:
Improved exploit's success rate
Implemented custom struct handling.

Improved module loading functions.

Added new sample functions.
https://github.com/Hykem/vitasploit/com ... 15bbd8aedb
My sig is original :D

Hykem
Guru
Posts: 75
Joined: Sat Jan 15, 2011 8:11 pm

Re: vitasploit - Exploitation Framework

Post by Hykem » Sun Nov 30, 2014 10:11 pm

Just pushed a couple more changes. Thanks to Netrix, the exploit's success rate has improved (avoids trashing the memory heap allowing a more predictable behavior) and it now supports basic struct handling (based on js-struct.js).
I've improved the module loading functions (you can now list/dump each module individually, e.g.: list_modules("SceLibc", true)), added loading of a new module SceCommonDialogMain (needed parameters just like ScePaf), corrected ScePaf loading parameters and implemented a path conversion test function to handle the "vs0:data/external/webcore" path.
Some modules were dependent on SceCommonDialogMain, so try using load_sysmodules1() and load_sysmodules2() to see which ones can be dumped now.
Xeeynamo wrote:app0:/eboot.bin is an encrypted SELF right? It's known where the executable is located in RAM? 'cause I cannot find it. At 0x18 of the eboot.bin I found 0x0001A678 (located in SCE header section) and at 0xB8 I found 0x00012e68 (located in ELF header section) but they point to nothing if I sum them to 0x8x000000.
Use the new convert_path function to see how the WebKit application maps itself. Uncomment the "Directory listing test" and it will now list the WebKit's directory in addition to the "app0:" path.
It's not clear were the executables get loaded, but try looking into some of the .suprx files that can be retrieved from this path and compare the offsets in their headers with their location in the RAM.
BATMAN-787 wrote:
Netrix wrote:
BATMAN-787 wrote:no progress for 3.18 yet?
This works fine on 3.18.
so is it to poke around or it will let you r/w something?
You can do plenty with this on 3.18, including memory reading, module dumping and support URI calls.

BATMAN-787
Posts: 33
Joined: Sun Oct 07, 2012 9:38 pm

Re: vitasploit - Exploitation Framework

Post by BATMAN-787 » Mon Dec 01, 2014 3:28 pm

BATMAN-787 wrote:
Netrix wrote:
BATMAN-787 wrote:no progress for 3.18 yet?
This works fine on 3.18.
so is it to poke around or it will let you r/w something?
Hykem wrote:You can do plenty with this on 3.18, including memory reading, module dumping and support URI calls.
so lets say i get my hands on this and somehow i get to the point where everyone can see the path of the
web-browser bubble app and somehow magically someones figures how to read/write a new path which will allow you to
place/or put files in there and i wanted to reach that point but im using a incompatible operating system, because mainly
everything is made windows based how will i be able to reach that ideological point by been a mac user.

User avatar
Zecoxao
Posts: 281
Joined: Mon Sep 27, 2010 7:27 pm

Re: vitasploit - Exploitation Framework

Post by Zecoxao » Sun Dec 14, 2014 8:55 pm

new revision of vitasploit, with some extra added tests.

https://github.com/Hykem/vitasploit/com ... 0a291e7f05
My sig is original :D

Post Reply

Return to “Programming and Security”