PS5 hacking: Zecoxao shares PS5 4.03 Filesystem dump (Webkit sandbox)
Following yesterday’s release of a script to dump the contents of the PS5, and for those who haven’t managed to run it themselves (or don’t have a PS5 4.03), Zecoxao has shared the content of a PS5 4.03’s disk, as extracted by the script from Bigboss.
There are some important caveats to this file dump: First of all, these are only the files that are accessible within the context of the (currently only publicly known) Webkit exploit, meaning only the files that Webkit has permissions to see on the PS5. Knowing that Webkit is frequently used as a vector of attack for computers, and how tight security is on PS5, it’s very likely that the number of files it has access to is very limited.
Furthermore, the files on the disk are encrypted. Although it’s possible that Webkit has access to the content of some libraries, decrypted, in RAM (required for its own usage), this current dump is from the filesystem itself, not things loaded in RAM. Encrypted files are, as is, pretty much useless, and this dump is mostly useful to confirm the file structure of the system.
What’s in the PS5 4.03 Sandbox dump
The archive contains a few fonts, a handful of encrypted binaries, and a lot of encrypted libraries.
The full list of filenames accessible from within the webkit context can be found on bigboss’ github here.
Download 4.03 Sandbox Filesystem dump
You can download the archive here. We emphasize again that this release, although interesting, is for now not useful “as is”. It does however confirm that the webkit ROP toolchain does give us some access to the system, even if limited.