Search the Community
Showing results for tags 'kexploit'.
Found 2 results
G'day guys. Bringing you some breaking news, if you haven't already heard.... qwerty has recently released his 4.55 Kexploit. This is absolutely great news as this works on firmwares up to and including 4.55. The good news and the bad news... Well the good news is that, as stated above, this will work up to and including 4.55, so this is some hope for all those people who are past 4.05, you have hope for the 4.55 jailbreak. The bad news? Well there are no current public implementations of this, and when i say that, i mean that no one has publicly released the exploit in a ready to go package, like the 4.05 jailbreak. BUT DO NOT FEAR, the information is present for developers to package this up just like the 4.05 jailbreak. We are only missing a few things. We have a Kexploit, but we do not yet have a Userland exploit for 4.55. You might be thinking that this is it right? we wont be able to use this Kexploit for a new jailbreak? Well you are wrong. Userland exploits are usually discovered much easier than the Kexploits. therefore, it should not be long before one is discovered, or publicly released by someone on the scene. Once the Userland exploit is released, it can be coupled with qwerty's Kexploit, and we have similar functionality of the 4.05 jailbreak, but on 4.55 firmware. It might take some time for this to be all put together, i am estimating mid to late march or a working release for end user. But we will see how fast these dev's work! Be patient guys because you don't want them to release chicken scratch code which is unstable and has the potential to damage or brick consoles due to not being complete. The time will come for a release, and when it does, it will be a good one that our dev's have spent lots of time working on to perfect for us!! On a side note, if you are on 4.086 or 4.07, well you might also be in luck!!! Considering we have Userland exploits which work on firmwares up to and including 4.07, this new kexploit can be compatible with those firmwares, so it may be possible that some talented devs will port it to work with 4.07. I personally do not think they will as most people will be looking to have the latest and greatest, this being 4.55, but the potential is there, and only time will tell FINALLY!!!! DO NOT UPDATE YOUR PS4 AFTER READING THIS. We highly recommend staying on the lowest firmware possible at all times, until the scene has 100% progressed to the new firmware. The current golden firmware being 4.05. If you have passed firmware 4.07, then it is up to you where you would like to stay, 4.55 is an expected next jailbreak, but who knows what has been in the works behind the scenes, hence why we recommend to stay on the LOWEST FIRMWARE POSSIBLE! Hope you guys enjoyed this write up, and get psyched for the future. At work? or at home doing homework and too busy to read this? Listen to my YouTube video below explaining all that is written here, rather then reading it Stay tuned for all the latest jailbreak news! Source: wololo.net Thumbnail:
Tutorial: Running the 4.05 kernelexploit & injecting our first payload! (In this tutorial i'll show you how to localy host & run the kernelexploit without having to go through the manuals for 25times...) Requirements: Preparing your Playstation 4 console: Preparing your Computer: Step 1: Now go to your PS4 and Set up an internet connection by simply changing the primary DNS with your Computer's IP as your primary DNS. Secondary DNS should be blank (0.0.0.0) & test your connection. Go to the user's guide and launch it You should now see something like this in your CMD screen: And something like this on your PS4 (depending what language you use.) : Step 2: On your PC, go to C:/Xampp/htdocs/and create the corresponding folders to have the same path Like just displayed on the PS4. (this path is different for everyone because of the language you are using.) For example mine is: C:\xampp\htdocs\document\nl Now extract the Webkit + Kernel exploit to a normal folder and rename it to "ps4". Place the "ps4" folder into your folder so the path matches. For me the path now is C:\xampp\htdocs\document\nl\ps4 Step 3: Now go back to your Playstation 4 and launch the user's manual again! If you followed everything you should now see a screen telling that the kernel exploit ran succesful! Step 4: Don't close the manual just yet! We will now send a payload to your Playstation 4 to enable the debug settings. Run Netcat GUI -> enter the IP of you ps4 -> change port from 9023 to 9020 -> select the debug_settings.bin file & click "inject payload". Now click the PS button on your controller to exit to the PS4 UI , now go into settings and scroll to the lower bottom you should now be prompted with the debug settings. Step 5 (extra): In this extra step we will now permanently enable the normal web browser so we don't have to do all this again everytime. Now go back to the user's manual you should now see this screen: Now we need to inject the enableWebBrowser405.bin payload just the same way like we injected debug settings payload. Once injected exit the user's manual by clicking the PS button on your controller & now you can access the normal web browser and use this to run the exploit in the future! (then just go to "your pc's ip"/document/nl/ps4) or other location where the ps4 folder is stored it doesn't matter anymore now. Have fun!!