Skip to content

Commit 794902f

Browse files
committed
Changed outlined in 0.3.21 release
1 parent 12883ed commit 794902f

File tree

13 files changed

+503
-406
lines changed

13 files changed

+503
-406
lines changed

.gitattributes

Lines changed: 0 additions & 2 deletions
This file was deleted.

.gitignore

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,9 @@
11
updates/*
2-
!updates/ps4-updatefeature.html
32
!updates/ps4-updatelist.xml
43
payloads/*
54
!payloads/PUT PAYLOADS HERE
65
exploits/*
7-
!exploits/index.html
6+
dns.conf
87

98
# Byte-compiled / optimized / DLL files
109
__pycache__/

README.md

Lines changed: 52 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -5,34 +5,51 @@ PS4 Exploit Host
55
This is an easy way for anyone to host their own exploit for the PS4 on their LAN. features include:
66
- Hosts your choice of exploit (Specter, IDC, and XVortex included in [releases](https://github.com/Al-Azif/ps4-exploit-host/releases))
77
- Sends your choice of payload after a successful exploit
8-
- Blocks PSN domains from resolving (Stops accidental updates)
9-
- Serves the 4.05 update to your PS4
8+
- Blocks PSN domains from resolving (Stops accidental updates and block telemetry)
9+
- Can serve the 4.05 update to your PS4
10+
- Works on just about every platform
1011

11-
If you do not want to host the package youself set your DNS to `108.61.128.158`. This has all of the features listed above except the payload sender. The exploit can be accessed from the `User's Manual` page in your settings.
12+
If you do not want to host the package yourself you can use my remote DNS. See the `Using remote DNS` section below.
1213

1314
## Requirements
14-
- [Python 3](https://www.python.org/downloads/) (**Only if not using a binary release**)
15-
- Root Privileges (Non-Windows)
15+
- If you are not using a binary release you will need [Python 3](https://www.python.org/downloads/)
16+
- Root privileges on non-Windows machines
1617

1718
## How to download
1819
- Download the zip on the [releases](https://github.com/Al-Azif/ps4-exploit-host/releases) page
19-
- Download with Git, be sure to grab the submodules
20+
- Download with Git, be sure to grab the submodules. This does not include any exploits or payloads.
2021

2122
`git clone --recursive https://github.com/Al-Azif/ps4-exploit-host.git`
2223

23-
## How to run
24+
## Using remote DNS (Run Nothing Locally)
25+
0. Make sure the PS4 is on firmware 4.05 or lower (`Settings > System > System Information`).
26+
- If your firmware version is >4.05 you are out of luck there is no public exploit available and you cannot downgrade.
27+
1. On your PS4 go to `Settings > Network > Setup Network` to setup a network. When you get to DNS Settings select `Manual` and set the Primary and Secondary DNS to `108.61.128.158`
28+
- If your firmware version is <4.05 you will get a network update available. This is for 4.05.
29+
2. On the PS4, go to `Settings > User's Guide` and select it. The exploit selection should appear.
30+
- You can also open browser and the default homepage will be the exploit selection.
31+
3. If you use Specter or IDC you will need to use another program to send a payload.
32+
33+
## How to run (Run Locally)
2434
1. Download the files (As shown in the "How to download" section above)
25-
2. Double click the executable (`ps4-exploit-host.exe`, `start.py`, etc)
35+
2. Double click the executable (`ps4-exploit-host.exe`, `start.py`, etc). If it starts with no errors, note the IP given
2636
- Alteratively run it from the command line (`ps4-exploit-host.exe`, `./ps4-exploit-host`, `python start.py`, etc)
27-
- If it starts with no errors, note the IP given
28-
4. On your PS4 `Settings > Network > Setup Network` when you get to DNS Settings select `Manual` set the IP address noted above as the Primary and Secondary DNS
29-
5. Make sure the PS4 is on firmware version 4.05 (`Settings > System > System Information`). If it is not use the jump to the "How to use the Updater" section before continuing
30-
6. On the PS4, go to `Settings > User's Guide` and select it. The exploit should run and there should be output on the script window.
31-
7. The script will prompt you to choose a payload to send. You may send the integrated payload or any payloads located in the `payload` folder.
32-
8. When done use `Ctrl+C` to cleanly close the application
33-
34-
## How to use the updater
35-
0. Follow the "How to run" section for your OS until it says to come here
37+
- If you are not root when running on a non-Windows machine you need to use `sudo`
38+
3. On your PS4 `Settings > Network > Setup Network` to setup a network. When you get to DNS Settings select `Manual` and set the Primary and Secondary DNS to the IP address you noted above.
39+
4. Make sure the PS4 is on firmware version 4.05 (`Settings > System > System Information`). If it is not use the jump to the "How to use the Updater" section before continuing
40+
- If your firmware version is >4.05 you are out of luck there is no public exploit available and you cannot downgrade.
41+
5. On the PS4, go to `Settings > User's Guide` and select it. The exploit should run and there should be output on the script window.
42+
6. The script will prompt you to choose a payload to send. You may send the integrated payload or any payloads located in the `payload` folder.
43+
7. When done use `Ctrl+C` to cleanly close the application
44+
45+
## Running on Raspberry Pi
46+
While the "How to run" section applies to the Pi as well there are some more complex options people may want to use for the Pi like running without any network whatsoever.
47+
48+
- To run as a standalone device that you plug directly into your PS4 though ethernet go [here](https://gist.github.com/Al-Azif/fe2ae67a2fb06cc136580b1e923c7aac) (Supports any Pi with a ethernet port)
49+
- To run as a WiFi access point for your PS4 go [here](https://gist.github.com/Al-Azif/765740019c45b9a49cbf739609cadda7) (Officially supports RPi 3 currently, may work on others with WiFi adapter)
50+
51+
## How to use the built in updater
52+
0. Follow the "How to run" section until it says to come here
3653
1. Put the system update in the `updates` folder as `PS4UPDATE_SYSTEM.PUP`
3754
- Optionally put the recovery update in the `updates` folder as `PS4UPDATE_RECOVERY.PUP`
3855

@@ -42,47 +59,46 @@ If you do not want to host the package youself set your DNS to `108.61.128.158`.
4259

4360
2. MAKE SURE THE DNS IS SET CORRECTLY!
4461
3. **SEE #2 I'M SO SERIOUS!**
45-
4. There should be a different page on the `System Software Update > View Details` option on the PS4. It'll be obvious!
46-
- The PS4 isn't using the right DNS if you get the standard Sony changelog page. **STOP IMMEDIATELY AND RESTART THE ENTIRE PROCESS**
62+
4. There should be a different page on the `System Software Update > View Details` option on the PS4. It will be obvious!
63+
- The PS4 is not using the right DNS if you get the standard Sony changelog page. **STOP IMMEDIATELY AND RESTART THE ENTIRE PROCESS**
4764
5. Run a system update on your PS4 system.
4865
6. Return to the "How to run" section
4966

5067
## Other Flags
51-
- Use the `--debug` flag to turn on the DNS & HTTP server output. This will make it hard to use the script normally as it'll push the payload menu off the screen
68+
- Use the `--debug` flag to turn on the DNS & HTTP server output. This will make it hard to use the script normally as it will push the payload menu off the screen
5269
- Use the `--interface` flag to specify which interface to bind to.
5370

5471
ex. sudo python3 start.py --interface 192.168.2.12
5572
- Use the `--dns_only` flag to only run the DNS server (Disables HTTP server, the payload sender is also disabled as this depends on the HTTP server).
5673
- Use the `--http_only` flag to only run the HTTP server (Disables DNS server).
57-
- Use the `--daemon` flag to automatically send the integrated payload (No payload menu will be shown)
5874
- Use the `--autosend` flag to automatically send the like-named payload from the payloads directory (No payload menu will be shown)
5975

6076
ex. sudo python3 start.py --autosend debug_settings.bin
6177

78+
- Create a `dns.conf` file in the same directory as the main application to append rules to the DNS server.
79+
80+
ex. `A example.com 0.0.0.0` will block example.com. You can use `{{SELF}}` to specify the computer running the DNS server.
81+
6282
## Troubleshooting
6383

6484
#### Script Related
6585
Before seeking help run though the following list:
66-
- Use the most recent release. Feel free to believe that the Python 2 release works better... I **won't** support it anymore.
67-
- "The Python 3 release cause a kernel panic, but the Python 2 release works." **The exploit sent is the same, you just got unlucky, try again...**
68-
- Follow the directions exactly, don't try to get fancy then come for help
69-
- **If the server starts (It gives you an IP and hasn't errored out) and you can't connect from your PS4 with 99.99% certainty your firewall/anit-virus is blocking it. This accounts for nearly all of the issues users have. I'm getting real tired of me saying it's the firewall and after an hour remote troubleshooting (Which is not fun) it ends up being the firewall like I said in the first place**
70-
- In your command prompt run `python --version` or `python3 --version` to make sure you have Python 3 installed correctly
71-
- Disable other networking apps that may interfere with the script (Skype, Discord, Torrent Clients, XAMPP, Firewalls, etc)
86+
- Use the most recent release.
87+
- Follow the directions exactly, do not try to get fancy then come for help.
88+
- If the server starts (It gives you an IP and has not errored out) and you cannot connect from your PS4, with 99.99% certainty your firewall/anit-virus is blocking it.
89+
- Disable other networking apps that may interfere with the script if you get port errors (Skype, Discord, Torrent Clients, XAMPP, Firewalls, etc).
7290
- It is normal to get some errors (PSN & NAT) while running the network test. This proves the PSN domains are blocked correctly.
7391

74-
7592
#### Exploit/Payload Related
7693
These are NOT related to this script in any way, but rather the exploits/payloads themselves:
77-
- Make sure your PS4's firmware is on 4.05 exactly. There is no downgrading. If you are above 4.05 you're out of luck for now.
78-
- Sending multiple payloads doesn't always work (Exploit may not be set up for it).
79-
- The PS4 can get a kernel panic and just shutoff. Physically unplug the power for a second, then power it back on.
94+
- Make sure your PS4's firmware is on 4.05 exactly. There is no downgrading. If you are above 4.05 you are out of luck for now.
95+
- The PS4 can get a kernel panic and just shutoff. Physically unplug the power for a second (Or hold the power button forever), then power it back on.
8096
- "Out of Memory" errors while loading the exploit page are normal, restart your PS4 if you get a lot of them in a row.
81-
- The integrated FTP Payload takes a minute to start the FTP server. Be patient and try again in a few seconds.
82-
- Other FTP payloads must be compiled or hex edited with your PS4's/Computer's IP.
97+
- The FTP servers can take a minute to start. Be patient and try again in a 30 seconds.
98+
- Some FTP payloads (None of the included ones) must be compiled or hex edited with your PS4's/Computer's IP.
8399
- FTP payloads do not have full access under Specter's exploit.
84-
- You must leave the exploit page open for FTP to work.
85-
- IDC's exploit page doesn't completely load even when it works.
100+
- You must leave the exploit page open for FTP to work as it runs in the webkit process.
101+
- IDC's exploit page does not completely load even when it works.
86102

87103
## Contributing
88104
You can check the [issue tracker](https://github.com/Al-Azif/ps4-exploit-host/issues) for my to do list and/or bugs. Feel free to send a [pull request](https://github.com/Al-Azif/ps4-exploit-host/pulls) for whatever.
@@ -97,4 +113,4 @@ You should just be able to place the exploit files in the `exploit` directory. T
97113
I have no self control... it also lets people see the actual development. From barely working chicken scratch to actual code.
98114

99115
## Credits
100-
- Specter, IDC, qwertyoruiopz, Flatz, CTurt, Mistawes, XVortex, LightningMods, CelesteBlue123, Anonymous, crypt0s, etc
116+
- Specter, IDC, qwertyoruiopz, Flatz, CTurt, Mistawes, XVortex, LightningMods, CelesteBlue123, Anonymous, neofreno, crypt0s, etc

exploits/index.html

Lines changed: 0 additions & 98 deletions
This file was deleted.

fakedns

Submodule fakedns updated 1 file

html/about.html

Lines changed: 105 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,105 @@
1+
<!DOCTYPE HTML>
2+
<html>
3+
<head>
4+
<meta charset="UTF-8">
5+
<title>About Exploits | PS4 Exploit Host by Al Azif</title>
6+
<style>
7+
html {
8+
height: 100%;
9+
}
10+
body {
11+
background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABCAQAAAC1HAwCAAAAC0lEQVR4nGP6zwAAAgcBApocMXEAAAAASUVORK5CYII=');
12+
background-position: right bottom;
13+
background-repeat: no-repeat;
14+
background-attachment: fixed;
15+
min-height: 100%;
16+
}
17+
#wrapper {
18+
width: 100%;
19+
}
20+
#contentHeader {
21+
padding: 20px 40px;
22+
background: #003263;
23+
border-top: 1px solid #6392b1;
24+
}
25+
#content {
26+
width: 100%;
27+
}
28+
#contentBody {
29+
padding: 40px 50px 20px;
30+
color: #333;
31+
}
32+
h1 {
33+
font-size: 150%;
34+
color: #fff;
35+
}
36+
h2 {
37+
font-size: 130%;
38+
font-weight: normal;
39+
border-bottom: 1px solid #003488;
40+
margin-bottom: 1em;
41+
}
42+
h3 {
43+
font-size: 120%;
44+
margin-top: 2em;
45+
padding-left: 5px;
46+
border-left: 10px solid #9EC9E1;
47+
margin-bottom: 1em;
48+
}
49+
.about {
50+
font-size: large;
51+
color: #fff;
52+
text-decoration: none;
53+
position: absolute;
54+
right: 20px;
55+
top: 80px;
56+
}
57+
ul.default {
58+
list-style: disc outside;
59+
margin-bottom: 1em;
60+
}
61+
ul.default li {
62+
margin-left: 1.5em;
63+
padding-left: 0;
64+
}
65+
</style>
66+
</head>
67+
<body>
68+
<div id="wrapper">
69+
<div id="contentWrapper">
70+
<div id="contentHeader">
71+
<div><h1>PlayStation 4 Exploit Host</h1><a href="/index.html" class="about">Back</a></div>
72+
</div>
73+
<div id="content">
74+
<div id="contentBody">
75+
<h2>About</h2>
76+
<h3>Specter:</h3>
77+
<ul class="default">
78+
<li>The original, listens for payloads on port 9020.</li>
79+
</ul>
80+
<h3>IDC:</h3>
81+
<ul class="default">
82+
<li>The same as Specter except it also breaks the webkit jail. Does not always look like it loads 100%.</li>
83+
</ul>
84+
<h3>XVortex HEN:</h3>
85+
<ul class="default">
86+
<li>Enables browser, blocks network updates, enables homebrew, and adds debug settings.</li>
87+
</ul>
88+
<h3>XVortex FTP:</h3>
89+
<ul class="default">
90+
<li>Starts an FTP server on port 1337. Runs in webkit process so if you close the page it stops running.</li>
91+
</ul>
92+
<h3>XVortex Dumper:</h3>
93+
<ul class="default">
94+
<li>Utility for dumping your games to a USB device.</li>
95+
</ul>
96+
<h3>Stooged Backup:</h3>
97+
<ul class="default">
98+
<li>Utility for dumping addcont.db, app.db, and gamesaves to a USB device.</li>
99+
</ul>
100+
</div>
101+
</div>
102+
</div>
103+
</div>
104+
</body>
105+
</html>

html/error.html

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
<!doctype html>
2+
<html>
3+
<head>
4+
<meta charset="utf-8">
5+
<title>Error %(code)d | PS4 Exploit Host by Al Azif</title>
6+
<style>
7+
.fullscreenDiv {
8+
text-align: center;
9+
}
10+
.error {
11+
font-size: xx-large;
12+
}
13+
.message {
14+
font-size: x-large;
15+
}
16+
</style>
17+
</head>
18+
<body>
19+
<div class="fullscreenDiv">
20+
<div class="error">Error %(code)d</div>
21+
<div class="message">%(explain)s</div>
22+
</div>
23+
</body>
24+
</html>

0 commit comments

Comments
 (0)