Skip to content

Commit 994037f

Browse files
committed
Integrated payload switched to @Mistawes combo payload (Tested and working on Phat/Slim/Pro)
1 parent 50136e9 commit 994037f

File tree

3 files changed

+8
-6
lines changed

3 files changed

+8
-6
lines changed

README.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -28,10 +28,10 @@ If you do not want to host the package youself set your DNS to `108.61.128.158`.
2828
2. Double click start.py
2929
- Alteratively run it from CMD with `python start.py`
3030
- If it starts with no errors, note the IP given
31-
4. On your PS4 `Settings > Network > Setup Network` when you get to DNS Settings select `Manual` set the IP address noted above as the Primary DNS and Secondary DNS
31+
4. On your PS4 `Settings > Network > Setup Network` when you get to DNS Settings select `Manual` set the IP address noted above as the Primary and Secondary DNS
3232
5. Make sure the PS4 is on firmware version 4.05 (`Settings > System > System Information`). If it is not use the jump to the "How to use the Updater" section before continuing
3333
6. On the PS4, go to `Settings > User's Guide` and select it. The exploit should run and there should be output on the script window.
34-
7. If there is at least one payload in the `payloads` directory the script will prompt you to choose a payload to send
34+
7. The script will prompt you to choose a payload to send. You may send the integrated payload or any payloads located in the `payload` folder.
3535
8. When done use `Ctrl+C` to cleanly close the script
3636

3737
## How to use the updater
@@ -72,10 +72,12 @@ These are NOT related to this script in any way, but rather the exploits/payload
7272
- Sending multiple exploits doesn't always work (Exploit may not be set up for it)
7373
- The PS4 can get a kernel panic and just shutoff. Unplug the power for 30 seconds, then power it back on.
7474
- "Out of Memory" errors while loading the exploit page are normal, restart your PS4 if you get a lot of them in a row.
75-
- The FTP payload must be compiled, hex edited, or use `makeftp.py` with your PS4's IP
76-
- The FTP payload does not have full access under Specter's exploit
75+
- The integrated FTP/UART/Debug Payload (By Mistawes) take a second to start the FTP server
76+
- The FTP payloads must be compiled or hex edited with your PS4's IP
77+
- FTP payloads do not have full access under Specter's exploit
7778
- You must leave the exploit page open for FTP to work
7879
- IDC's exploit page doesn't completely load even when it works
80+
7981
## Contributing
8082
You can check the [issue tracker](https://github.com/Al-Azif/ps4-exploit-host/issues) for my to do list and/or bugs. Feel free to send a [pull request](https://github.com/Al-Azif/ps4-exploit-host/pulls) for whatever.
8183
Be sure to report any bugs, include as much information as possible.

payloads.py

Lines changed: 1 addition & 1 deletion
Large diffs are not rendered by default.

start.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -303,7 +303,7 @@ def payload_brain(ipaddr):
303303
send_payload(ipaddr, 9020, content)
304304

305305
payloads.insert(0, 'Don\'t send a payload')
306-
payloads.insert(1, 'Integrated FTP (IDC\'s)')
306+
payloads.insert(1, 'Integrated FTP/UART/Debug (Mistawes)')
307307
choice = menu('Payload', payloads)
308308
if choice == 1:
309309
print('>> Sending integrated FTP...')

0 commit comments

Comments
 (0)