This is an easy way for anyone to host their own exploit for the PS4 on their LAN. It blocks PSN to stop accidental updates, it also serves the 4.05 update if you want it to. You can also generate an FTP payload. There is also a simple CLI for sending additional payloads.
So the scope of this has become like an all in one toolkit
You won't be dependent on 3rd party websites
- They could be down
- They could be blocked
- They could be broken
- Etc, etc, etc.
- Python 2 (Tested on 2.7.14)
- The Python Directory added to your System Path Environment Variable (Windows)
- Try running
envpython.bat
if you are having issues
- Try running
- Root Privileges (Non-Windows)
- This should run on Windows, OSX, and Linux (Tested on Windows 7, Windows 10, and Ubuntu 16.04)
-
Download the zip on the releases page
-
Download with Git, be sure to grab the submodules
git clone --recursive https://github.com/Al-Azif/ps4-exploit-host.git
- Make sure you have Python 2.7 installed and ENV Paths set
- Download the files (As shown in the "How to download" section above)
- Double click start.py
- Alteratively run it from CMD with
python start.py
- If it starts with no errors, note the IP given
- Alteratively run it from CMD with
- On your PS4
Settings > Network > Setup Network
when you get to DNS Settings selectManual
set the IP address noted above as the Primary DNS and0.0.0.0
as the Secondary DNS - Make sure the PS4 is on firmware version 4.05 (
Settings > System > System Information
). If it is not use the jump tp the "How to use the Updater" section before continuing - On the PS4, go to
Settings > User's Guide
and select it. The exploit should run and there should be output on the server window - If there is more than one payload in the
payloads
directory the server will prompt you to choose which one to send - When done use
Ctrl+C
to cleanly close the script
- Make sure you have Python 2.7 installed correctly
- Download the files (As shown in the "How to download" section above)
- Open your CLI in the script directory
- Run
sudo python start.py
from the command line- If it starts with no errors, note the IP given
- On your PS4
Settings > Network > Setup Network
when you get to DNS Settings selectManual
set the IP address noted above as the Primary DNS and0.0.0.0
as the Secondary DNS - Make sure the PS4 is on firmware version 4.05 (
Settings > System > System Information
). If it is not use the jump tp the "How to use the Updater" section before continuing - On the PS4, go to
Settings > User's Guide
and select it. The exploit should run and there should be output on the server window - If there is more than one payload in the
payloads
directory the server will prompt you to choose which one to send - When done use
Ctrl+C
to cleanly close the script
-
Follow the "How to run" section for your OS until it says to come here
-
Put the system update in the
updates
folder asPS4UPDATE_SYSTEM.PUP
-
Optionally put the recovery update in the
updates
folder asPS4UPDATE_RECOVERY.PUP
SYS SHA-256: D0C46E3CAADE956CABCBD20313A8EAB48DDBF3BC3129F3144926BECCFE3D36C4
REC SHA-256: B74CE16802CD7EC05158C1035E09A3131BC1D489DA2B4EF93B2C6029D9CA2BFA
-
-
MAKE SURE THE DNS IS SET CORRECTLY!
-
SEE #3 I'M SO SERIOUS!
-
There should be a different page on the
System Software Update > View Details
option on the PS4. It'll be obvious- If this page doesn't display it also means it worked... the server becomes blocking while uploading the update. This is a bug
- The PS4 isn't using the right DNS if you get the standard Sony changelog page. STOP IMMEDIATELY AND RESTART THE ENTIRE PROCESS
-
Run a system update on your PS4 system.
-
Return to the "How to run" section
- Make sure you have Python 2.7 installed
- Run
python makeftp.py --ip ***.***.***.***
where the *s are the PS4's LAN IP - Run the exploit or use
sender.py
-
Make sure you have Python 2.7 installed
-
To send payloads:
python sender.py
, this will open a menu that will have options for sending each payload in thepayloads
directorypython sender.py --ip ***.***.***.*** --payload "payloads/ftp.bin"
, where the *s are the PS4's LAN IP, will send the payload located atpayloads/ftp.bin
You can check the issue tracker for my to do list and/or bugs. Feel free to send a pull request for whatever. Be sure to report any bugs, include as much information as possible.
You should just be able to replace the exploit files in the exploit
folder.
I have no self control... it also lets people see the actual development. From barely working chicken scratch to actual code.