A set of PS4 experiments using the WebKit exploit
A collection of PS4 tools and experiments using the WebKit exploit. This is for firmware 1.76 only at the moment.
Although initially just a framework to help write and execute ROP chains, the playground now allows for running unsigned binaries compiled with the PS4-SDK, and booting Linux from USB.
A live demo can be tried here.
You should clone the repo and upload it your own server if you wish to make changes:
git clone git://github.com/CTurt/PS4-playground.git
You can also download a zip of the latest source here.
After executing a test, you should either refresh the page, or close and reopen the browser entirely; running multiple experiments sequentially is not reliable. If you are using a web browser view in an app which isn't the Internet Browser, you can use the
Miscto refresh the page.
Click "Go", and wait for the text "Stage: Waiting for payload..." to appear.
Send the desired binary over TCP to your PS4 on port 9023; you can use any standard networking tool to do this, or my custom Windows tool, WiFi-Loader
If you're on Linux, the easiest way is probably to use
nc -w 3 192.168.0.7 9023 < *.bin
After you have sent the binary, it will be executed automatically.
You need a FAT32 formatted USB drive plugged in on any PS4's USB port with the following files on the root directory:
bzImage: Kernel image that will be loaded. Recommended to use this sources to compile it.
initramfs.cpio.gz: The initial file system that gets loaded into memory during the Linux startup process. This one is recommended.
The file names must match with the above and you can have more files on the same USB drive. From there you can setup the environment to run from an NFS share or from an external drive via USB (recommended) and boot a complete distro!
Get PID- Get process ID
Get Login- Get login name and leak a kernel pointer
Get Loaded Modules- Get a list of currently loaded modules, index and ID
Dump Loaded Module- Dump a currently loaded module (use
Get Loaded Modulesto see all available)
Load Module- Load an additional module from this list
Once you have loaded a module, refresh the page, and you will be able to dump it.
Browse- File Browser
Get PSN username- Read your PSN username from
Get Sandbox Directory- Get the name of the current sandbox directory (10 random characters which change each reboot)
Get Stack Protection- Get stack base, size, and protection
Get Stack Name- Get stack base, size, and name
Send Message- Send a TCP message to the specified IP and port
File and memory dumps will be sent over TCP to the IP and port you specified.
You can use a simple tool like TCP-Dump to write the data to a file.