PS5: Payload loader + accompanying FTP Server released for 4.03 (BD-JB only)
It’s going to be a bit messy in the days to come, to figure out whether your hacked PS5 is compatible with the latest release, given that there are two entry point exploits (the Webkit one and the BD-JB one), which don’t bring the same level of tinkering at the moment. There’s good hope that ultimately the situation will stabilize, and that both versions of the PS5 hack will get equivalent levels of support, but today the BD-JB exploit takes the lead with a payload loader being released by Sleirsgoevy, which allows to do some actual interesting stuff. First payload to be provided is, of course, an FTP server, so that people can start browsing the internals of their PS5 from the comfort of their PC, with an FTP client.
Note: this has been reported to be 4.03 only at the moment, not 4.50. And because this involves BD-JB, this is for physical editions of the PS5 only, not digital (duh).
BD-JB based Payload loader
Sleirsgoevy has released a new version of the PS5 exploit, based on the BD-JB entry point, which lets you upload a binary to your PS5 via netcat then run it. (a.k.a. a payload loader)
You will of course need a Blu-Ray Burner and some blank Blu-Rays to run the exploit, we recommend rewritable blu-rays at this point given how quickly things evolve. (Ultimately there’s good hope that we’ll see an implementation of the exploit that is flexible enough to be burned once and for all on a disc, then allow you to load/unload stuff dynamically). Honestly any Blu-Ray burner should do, but in the past we’ve recommended these: Blu-Ray Burner, and rewriteable Blu-Ray discs
- The Payload loader: download link on mega (source: sleirsgoevy)
By the way do understand that now that there is a PS5 Kernel exploit available, running the wrong piece of code at the wrong time could actually permanently brick your PS5. This is even more complicated in the case of an iso that you download from a random site (compared to one you’d have compiled yourself) because you can’t inspect the source code yourself. So always double check the source of the link before running anything. That includes links we’ll provide here: as you can see I also included Sleirsgoevy’s tweet above so that you can click directly on his url rather than ours.
PS5 FTP Server
Once you have the Payload loader up and running, you will want to send a payload containing the FTP Server. That’s what Zecoxao has provided here:
- FTP Server (source) MD5: 9afddea3a9443284a23e5d7cc81938a5 payload.bin
How to run the FTP Server on PS5
- Ensure your PS5 is running firmware 4.03 or 4.50
- Download the Payload Loader, then burn it on a BD-RE disc with a Blu-ray burner
- Download the FTP Server payload.
- On the PS5, go to “media” and run the Blu-ray you just created. This should start the exploit

- The loader is now waiting for a payload to be sent to port 9019
- You can now use a tool such as Netcat GUI to send the payload to your PS5: this will start the FTP Server (enter your PS5’s IP and 9019 as the port)

- You can now access your PS5’s hard drive content via FTP. On any FTP client (such as FTPZilla) go to your PS5’s IP, on port 1337
Details in this great video by Modded Warfare:
What’s on the PS5 root folder?
Here’s an example of what we can find on the PS5 via FTP at the moment (screenshot by Echo Stretch). We’ve seen some of that before with the existing Webkit and BD-JB exploits, but it’s certainly refreshing to be able to access those folders via a more convenient mechanism

- adm
- app_temp0
- app_temp1
- app_tmp
- data
- dev
- devbin
- devlog
- hdd
- host
- hostapp
- mnt
- preinst
- preinst2
- system
- system_data
- system_ex
- system_tmp
- update
- usb
- user
- decid_update.elf
- first_img_writer.elf
- mini-syscore.elf
- safemode.elf
- SceSysAvControl.elf
- setipaddr.elf
It’s worth noting that any critical files on the PS5 (or game discs) is encrypted, and useless “as is” until means to decrypt the data are figured out. Nonetheless, the more files we are able to pull from the PS5, the more hope there is to reverse engineer some of the system, to find more exploits or gain more knowledge on the system. Of course the hard drive is hardly the most interesting part here, what’s in RAM being potentially way more interesting to hackers.
Patiently waiting to see if this gets us ps3 cfw
Nice just got a ratchet and clank disk bundle on amazon de for 850€ let the piracy begin lulz
Could this be used to delete downloaded but not installed firmware updates? I’m on version 3.something but have some update downloaded and willing to install each time I power off the ps5, and I would be more than happy to remove it from all kind of existence from my ps5
The FTP Payload link in the “How to run the FTP Server on PS5” section is an Amazon link. You may want to change that.
Thanks! Apologies for the bad copy/paste mistake here, will fix!