Skip to content
Easy PS4 Exploit Hosting
Branch: master
Clone or download
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
.github Update to be more clear as the first issue opened after I posted this… Aug 11, 2018
debug More debugging tweaks Sep 12, 2018
exploits Add empty exploits folder Feb 21, 2018
fakedns @ 4cb2171 Update submodule Jun 15, 2018
payloads Add 4.05 updater Dec 27, 2017
pkgs Prepping for flatz's remote installer release, building GUI now Oct 31, 2018
themes Autoload fix, some options where set to public when I wanted the oppo… Mar 20, 2019
updates Use old psp2 vs psv Mar 13, 2019
.gitignore
.gitmodules
FAQ.md
LICENSE
README.md
build-static.py Doesn't need both Mar 11, 2019
news.json
settings.json Refactoring Mar 12, 2019
start.py Autoload fix, some options where set to public when I wanted the oppo… Mar 20, 2019

README.md

PS4 Exploit Host

What is this?

This is an easy way for anyone to host their own exploit for the PS4 on their LAN. Features include:

  • Hosts your choice of exploit
  • Allows caching of exploits for offline use
  • Sends your choice of payload after a successful exploit
  • Blocks PSN domains from resolving (Stops accidental updates and block telemetry)
  • Serves a specific firmware update to your PS4
  • Works on just about every platform
  • Static Website builder, to run on HTTP server of your choice (You lose some features using this method, DNS, updater, etc)

If you do not want to host the package yourself you can use my remote DNS. See the Using remote DNS section below.

PLEASE READ THIS README AND THE FAQ BEFORE POSTING AN ISSUE.

Requirements

  • If you are not using a binary release you will need Python 3
  • Root privileges on non-Windows machines

How to download

  • Download the zip on the releases page

  • Download with Git, be sure to grab the submodules. This does not include any exploits or payloads. This is for experts only, download a release if you have issues

    git clone --recursive https://github.com/Al-Azif/ps4-exploit-host.git

Using remote DNS (Run Nothing Locally)

  1. Make sure the PS4 is on firmware 5.07 or lower (Settings > System > System Information).
    • If your firmware version is >5.07 you are out of luck there is no public exploit available and you cannot downgrade.
  2. On your PS4 go to Settings > Network > Setup Network to setup a network. When you get to DNS Settings select Manual and set the Primary to 165.227.83.145 and the Secondary DNS to 108.61.128.158 or visa-versa.
    • If your firmware version is <5.05 you will get a network update available. This is for 5.05.
    • If you already have an official updated above 5.05 downloaded you must delete it first.
  3. On the PS4, go to Settings > User's Guide and select it. The exploit selection should appear.
    • You can also open browser and the default homepage will be the exploit selection.
  4. If you use Bin Loader you will need to use another program to send a payload.

My Twitter is @_AlAzif you can check my recent tweets for know issues/maintenance info

How to run (Run Locally)

  1. Download the files (As shown in the "How to download" section above)
  2. Double click the executable (ps4-exploit-host.exe, start.py, etc). If it starts with no errors, note the IP given
    • Alternatively run it from the command line (ps4-exploit-host.exe, ./ps4-exploit-host, python start.py, etc)
    • If you are not root when running on a non-Windows machine you need to use sudo
  3. On your PS4 Settings > Network > Setup Network to setup a network. When you get to DNS Settings select Manual and set the Primary and Secondary DNS to the IP address you noted above.
  4. Make sure the PS4 is on a firmware version <=5.07 (Settings > System > System Information).
    • If your firmware version is >5.07 you are out of luck there is no public exploit available and you cannot downgrade.
  5. On the PS4, go to Settings > User's Guide and select it. The exploit should run and there should be output on the script window. (Alternatively you can just open the Browser)
  6. If applicable for your chosen exploit, the script will prompt you to choose a payload to send. You may send any payload located in the payloads folder.
  7. When done use Ctrl+C to cleanly close the application

Note: You can edit settings.json to modify the hosts behavior. There is a section below with more info.

Running on Raspberry Pi

While the "How to run" section applies to the Pi as well there are some more complex options people may want to use for the Pi like running without any network whatsoever.

  • To run as a standalone device that you plug directly into your device though ethernet go here (Supports any Pi with a ethernet port)
  • To run as a WiFi access point for your device go here (Officially supports RPi 3 currently, may work on others with WiFi adapter)

How to use the built in updater

If you already have an official updated above 5.05 downloaded you must delete it first.

  1. Follow the "How to run" section until it says to come here

  2. Put the system update in the updates folder as PS4UPDATE_SYSTEM.PUP

    • Optionally put the recovery update in the updates folder as PS4UPDATE_RECOVERY.PUP

      5.05 SYS MD5: F86D4F9D2C049547BD61F942151FFB55

      5.05 REC MD5: C2A602174F6B1D8EF599640CD276924A

  3. MAKE SURE THE DNS IS SET CORRECTLY!

  4. SEE #2 I'M SO SERIOUS!

  5. There should be a different page on the System Software Update > View Details option on the PS4. It will be obvious!

    • The PS4 is not using the right DNS if you get the standard Sony changelog page. STOP IMMEDIATELY AND RESTART THE ENTIRE PROCESS
  6. Run a system update on your PS4 system.

  7. Return to the "How to run" section

Modifying settings.json

It's probably a good idea to make a backup of the default settings.json just in case. Any invalid settings will throw a warning and use a default value.

Use valid json formatting. Boolean values should be lower case, integers should not be quoted, etc.

Setting Notes Type
Debug Will print debug info from the DNS/HTTP servers boolean
Root_Check Will skip the root user check for Linux/OSX, only disable if you are sure you don't need it. Will cause port errors if set wrong boolean
Public If the server is listening on a public IP (Disabled payload sending other than "Auto_Payload and disables viewing/editing settings remotely) boolean
DNS If the DNS server should be run boolean
HTTP If the HTTP server should be run boolean
DNS_Interface The IP of the interface to bind the DNS server to string (IP Address)
DNS_Port The port to bind the DNS server to int (1-65535)
HTTP_Interface The IP of the interface to bind the HTTP server to string (IP Address)
HTTP_Port The port to bind the HTTP server to int (1-65535)
Compression_Level Enables gzip compression on the HTTP server, 0 being disabled, 9 being most compressed int (0-9)
UA_Check If the UA should be checked against values in the Valid_UA setting boolean
Theme Which theme to use, themes must be located in the themes folder string
Sticky_Cache Whether the appcache manifest should be included in itself or not boolean
Auto_Payload Payload to send to any IP that accesses server at /success. Payload must be in the payloads folder string
Payload_Timeout The timeout, in seconds, to try and send a payload through the payload menu before timing out int (1-999)
DNS_Rules Fake DNS control block
DNS_Rules [Redirect IP] The IP address to redirect URLs listed in the Redirect rules to string (IP Address)
DNS_Rules [Redirect] Array of domains to forwards to DNS_Rules [Redirect IP] array of strings (regex)
DNS_Rules [Block] Array of domains to block array of strings (regex)
DNS_Rules [Pass_Through] Array of IP addresses to not modify DNS requests array of strings (IP Address)
Valid_UA User-Agents to allow access to exploits, only used if UA_Check is enabled array of strings (regex)
Update Updater control block
Update [PS4_No_Update] The PS4 version (and lower) listed here will not be served update files float
Update [Vita_No_Update] The PS Vita version (and lower) listed here will not be served update files float

About offline caching

  • Redirect/Theme info is cached automatically
  • Redirect/Theme info updates and refreshes automatically
  • Exploits can be cached on a per firmware basis or all cached at once with the dropdown menu and/or [Cache All] button on the exploit selection menu.
  • Exploit updates must be "manually" updated by clicking cache button an update is available or checking the "About" option in the exploit's dropdown menu.
    • You will be told if there is no update when clicking the button.
  • If you are offline the caching buttons will be hidden as will exploits that require a network connection or are not cached

About autoload

  • Exploits can be automatically selected by clicking "Autoload" in the exploits dropdown menu
  • When you open the browser it'll automatically select that exploit
  • This can be disabled by clearing your browsers cookies

Contributing

You can check the issue tracker for my to do list and/or bugs. Feel free to send a pull request for whatever. Be sure to report any bugs, include as much information as possible.

What if a new exploit is released?

You should just be able to place the exploit files in the exploit directory. The exploit will automatically add the exploit to the menu.

    ex. exploits/firmware_version/exploit_name/index.html

Why do you commit so many little changes, tweaks, etc?

I have no self control... it also lets people see the actual development. From barely working chicken scratch to actual code.

Credits

  • Specter, IDC, qwertyoruiopz, Flatz, CTurt, Mistawes, XVortex, LightningMods, CelesteBlue123, Anonymous, neofreno, wolfmankurd, crypt0s, etc
You can’t perform that action at this time.