Search the Community
Showing results for tags 'hax'.
Found 1 result
Tutorial: Running the 4.05 kernelexploit & injecting our first payload! (In this tutorial i'll show you how to localy host & run the kernelexploit without having to go through the manuals for 25times...) Requirements: Preparing your Playstation 4 console: Preparing your Computer: Step 1: Now go to your PS4 and Set up an internet connection by simply changing the primary DNS with your Computer's IP as your primary DNS. Secondary DNS should be blank (0.0.0.0) & test your connection. Go to the user's guide and launch it You should now see something like this in your CMD screen: And something like this on your PS4 (depending what language you use.) : Step 2: On your PC, go to C:/Xampp/htdocs/and create the corresponding folders to have the same path Like just displayed on the PS4. (this path is different for everyone because of the language you are using.) For example mine is: C:\xampp\htdocs\document\nl Now extract the Webkit + Kernel exploit to a normal folder and rename it to "ps4". Place the "ps4" folder into your folder so the path matches. For me the path now is C:\xampp\htdocs\document\nl\ps4 Step 3: Now go back to your Playstation 4 and launch the user's manual again! If you followed everything you should now see a screen telling that the kernel exploit ran succesful! Step 4: Don't close the manual just yet! We will now send a payload to your Playstation 4 to enable the debug settings. Run Netcat GUI -> enter the IP of you ps4 -> change port from 9023 to 9020 -> select the debug_settings.bin file & click "inject payload". Now click the PS button on your controller to exit to the PS4 UI , now go into settings and scroll to the lower bottom you should now be prompted with the debug settings. Step 5 (extra): In this extra step we will now permanently enable the normal web browser so we don't have to do all this again everytime. Now go back to the user's manual you should now see this screen: Now we need to inject the enableWebBrowser405.bin payload just the same way like we injected debug settings payload. Once injected exit the user's manual by clicking the PS button on your controller & now you can access the normal web browser and use this to run the exploit in the future! (then just go to "your pc's ip"/document/nl/ps4) or other location where the ps4 folder is stored it doesn't matter anymore now. Have fun!!