Pre-release
Pre-release

@Al-Azif Al-Azif released this Jun 20, 2018 · 53 commits to master since this release

Assets 7
  • Various minor bugfixes

  • Various caching fixes and optimizations

    • Theme cached by default
    • Loading bar and notifications for caching
    • Exploits cached on demand (By individual firmware or all)
    • Caching buttons will not show up offline
    • Fixed payload listening exploits while cached
    • Preview for "Sticky Caching"
  • Default theme QoL improvements

    • Fixed grey artifacts on buttons
    • "O" will now go back
    • If only one firmware is available it will autoselect
  • Added option gzip compression (Enable it in setting)

  • Settings (Your old settings will not work)

    • More/better warning/import rules
    • Reorganized
    • UA_Check disabled by default
    • Added DNS settings (Changing the port will not just work, if you change it you're on your own)
    • Add default timeout for payload sender
    • Add gzip compression level (Valid values are 0 through 9, from least to most compression, 0 is disabled)
  • You can now specify a payload to send from the exploit itself

    Copy the "Original" exploit, in "index.html" change ping("/success"); to ping("/success/9020/15/test.bin); to send "test.bin" (from the payloads folder) to port 9020 after successful exploitation with a 15 second timeout

  • UA blocker now uses regex

  • Updated Readme and FAQ

  • App2USB rebuilt for release

@Al-Azif Al-Azif released this Jun 11, 2018 · 96 commits to master since this release

Assets 8
  • Fixed issue with cache manifest generation
  • Added hash to manifest

@Al-Azif Al-Azif released this Jun 10, 2018 · 100 commits to master since this release

Assets 2
  • Whitespace issue fixed #113
  • Added offline HTML5 cache option to settings (Enabled by default) by @ps4miner #108

Nuked because it was not always caching, use 0.4.5 instead

@Al-Azif Al-Azif released this Jun 7, 2018 · 104 commits to master since this release

Assets 7
  • 5.05/5.07 enabled by default
  • 5.05 payloads/exploits included
  • Fixed network test
  • Fixed updater
  • RPi issue fixed by @Vadammt
  • Removed 4.05 spoofed UA in settings.json and default theme's script.js (Even less reason to be on 4.05 now)
  • Block all Nintendo subdomains

- ARM Build/RPi Scripts coming by this weekend

@Al-Azif Al-Azif released this Apr 7, 2018 · 124 commits to master since this release

Assets 8

UPDATED FOR 5.05

Last change at 4:30am UTC on May 28th

Changelog

  • Javascript/OSX Error fix by @alu0100845235
  • Switched #!/usr/bin/python3 back to #!/usr/bin/env python3 by @artik
  • auto_exploit fix by @MoserB
  • Added HTTP_Port and Root_Check setting by @arioko
  • Added version in menu header by @arioko
  • Renamed Interface setting to Interface_IP requested by @JanJastrow
  • Added --settings arg to specify settings.json file location requested by xeroxmalf#7646
  • Updated README.md
  • Added FAQ.md
  • Add Host_Version into data javascript object to use in themes
  • Add Lang_Code into data javascript object, if available, to use in themes
  • Attempt to detect spoofer with default theme (New included HEN uses 5.51 spoofer... since 5.51 doesn't exist, yet, it's mapped to 4.55, likewise 5.05 is mapped to 4.05 as the full UA for 5.05 is blocked by default so if 5.05 is able to access the page it's actually 4.05, be aware 4.05 support is dropped)
  • Fixed issue with menu not reopening after selecting "Don't send a payload"
  • Renamed DNS_Rules['Pass_Through'] setting to DNS_Rules['Pass_Through_IP']
  • Renamed DNS_Rules['Self'] setting to DNS_Rules['Redirect']
  • Added DNS_Rules['Redirect_IP'] to settings
  • Removed warning on empty setting, the default, for Interface_IP
  • Remove unused patch payload function
  • Updated/Added payloads
  • Removed majority of 4.05 payloads from release
  • Add alias for URL http://the.gate while using DNS (Project likely being renamed due to the next bullets in this list and the announcement)
  • Nintendo Switch (3.0.0) support (Mostly Untested)
    • Block Updates with DNS
    • Redirect connection test
    • No exploit included (nx-hbexploit in next release)
  • PlayStation Vita (3.60) Support (Mostly Untested)
    • Blocks updates with DNS
    • Redirect User's Manual
    • Updater support
    • No exploit included (Henkaku in next release)
  • More console support pending
  • Removed some update settings... I'll build a standalone update deleter or something
  • THE UPDATER NO LONGER CHECKS MD5 CHECKSUMS

Announcement

This project has been a little neglected since the 0.4.1 release almost a month ago as I've been working on another project since that release. I've haven't been hiding and posted a bit on Discord so this won't come as a surprise to some. It's a "modchip" for webkit exploits, mirroring the existing ESP8266 methods, just with more features/polish. The device can either create a network to connect to (No internet access), connect to an existing network (Works just like this host), or create a bridge (Enabling internet access though the device). It's a custom PCB that's about 25mm*18mm*4mm (Currently) so it should fit inside most consoles. The front end looks like my regular exploit host and you can view a demo (out of date) of the control panel here.

Features
  • Control the device from your phone/computer over Bluetooth/Wifi
  • Open API for developers to interact/control the device
  • Press physical buttons on the console
  • View/Download UART data
  • Add, download, or delete exploits with one button click
  • Custom filetype (Compresses exploits into a single file to install/share)
    • Supports both Bin and JS payloads
    • Includes application to compress/extract these files
    • This is to save space and add to ease of use
  • Web based firmware updates for this device (Need no physical access to device to update it)
  • Basic usage without soldering (No buttons or UART)
  • A secret feature that'll be revealed after it's working 100%
    • If you do some snooping on the PCB you might be able to guess it
Hardware Info
  • USB-C port (Custom pinout for internal installation, but can just run off USB power)
  • SD card for exploit storage (GBs vs 3MB)
  • User Expandable
  • Custom Case for external use (Extender to turn a female USB-C to a male USB-A)
Testing process
  1. Software testing with ESP(8266/32) dev boards.
  2. Finish prototype PCB boards.
  3. Send out prototype boards. Will be a small batch, about 10 boards.
  4. "Finish" software, get feedback, make revisions to PCB as necessary.
  5. First batch of v1.0 boards. (Current bill of materials puts PCB cost @ $10 depending on interest, larger order sizes will make the board cheaper)
Beta Tester Info

It's currently in a working state, just using the API, with majority of the features are done (Currently the bluetooth controller & the admin panel HTML+JS are not 100%) and I'll be looking for testers (Bring your own board) within the next two week or so. Contact me on Twitter or Discord if your interested in testing.

To be a part of the first testing process you just need familiarity with the exploit process and familiarity with your ESP board (Be able to use the serial logger and flash the firmware).

To get one of the prototype boards soldering ability is a must. There are ~6 wires to solder, 2 of which being on the PS4 motherboard. I'll eat the cost for the prototypes.

If there is demand for prototypes, I may make a bigger order and will send them out at cost or make a bigger PCB order and send out PCBs with the bill of materials.

When all is said and done I plan to open source all the code/PCB info so others can help further development/produce boards for others. I want to have it at a 1.0 state before releasing before having others make incompatible software/PCBs.

@Al-Azif Al-Azif released this Mar 11, 2018 · 159 commits to master since this release

Assets 7

Some pretty big changes in this version, so I do expect some bugs, be sure to report them.

  • Added qwertyuiop's webkit rewrite to all 4.55 exploits
  • Updated all paylaods
    • Added web dumper back... still doesn't really work but it's built from source
    • New rule, I have to be able to see the source to include it a payload in a release
  • Try to fix issues users were having when extracting release on top of an old release. Don't do this.
  • Removed all args, replaced with settings.json
    • You can now delete updates, on any firmware version, by setting max_update in settings to be below your current firmware version (Must be higher than no_update). Make sure you do this before updating with the updater if you already have a official firmware update downloaded.
    • Added DNS pass through for devices you do not want DNS redirection on
    • Added option to disable UA checks
  • Added pingback to exploits that expect payloads (New payload menu trigger)
    • There are also no longer print statements while the menu is open
  • Added version check to warn users of an update for ps4-exploit-host
  • Default theme now grays out firmwares that do not match UA (Can still be clicked)
  • Added magenta theme by @mickyyman

All 4.05 exploits/payloads, besides "Update Enabler", will be removed in the next release.

@Al-Azif Al-Azif released this Mar 1, 2018 · 188 commits to master since this release

Assets 8

See #42 if you are considering using the updater

  • Bug fix by @wolfmankurd
  • Updated read me... please actually read it before posting issues/contacting me
  • Exploits & payloads updated

For those having trouble with the web FTP download the FTP_Fix.zip and place the files in the exploits/4.55/FTP/ directory. If you downloaded after this was posted the fix is already applied.

Do not download Source code (zip) or Source code (tar.gz) they are auto generated by GitHub and are missing dependencies.

Pre-release

@Al-Azif Al-Azif released this Feb 28, 2018 · 200 commits to master since this release

Assets 2
Pre-release

@Al-Azif Al-Azif released this Feb 28, 2018 · 197 commits to master since this release

Assets 7

See #42 if you are considering using the updater

  • Removed remaining 4.05 refs for 4.55 updater
  • Add support for 1.76, 4.05, 4.55, and 5.01-5.05 (Only webkit for 5.0X)
    • This is actually just multiple firmware support and more included exploits packages
  • Added web "Holy Grail"

This is still in testing and is a pre-release.

@Al-Azif Al-Azif released this Feb 21, 2018 · 214 commits to master since this release

Assets 7

This release and all prior releases are for 4.05

Let's Jam

Backported relevant changes from new UI to old script

  • Updated all exploits/payloads

  • Exploit selection is now alphabetized (Should show up in the same order on every system now)

  • Added about page to explain included exploits

  • "Better" regex for handler

    • More URLs serve the exploit page (Root directory and default browser homepage)
    • Can use periods and spaces in exploit directories
  • Custom error page

  • User-Agent checker to inform users if using the wrong PS4 firmware

  • Change connection type to close threads earlier

  • Reorganize HTML locations

  • IFrame method to serve exploits

  • Built set of payloads to use with Specter/IDC.

    • XVortex FTP
    • XVortex HEN
    • XVortex Dumper
    • Stooged Backup
  • Removed built in payloads

  • Removed Daemon arg

  • Can use dns.conf to specify additional DNS rules (Will be prioritized above internal rules)

      ex. `A example.com 0.0.0.0` will block example.com. You can use `{{SELF}}` to specify the computer running the DNS server. Use newlines to seperate rules
    
  • Easy way to change background image on host

    • For people complaining about "The anime chick"
    • Put your image in the html directory as image.png, image.jpg, or image.gif
    • Will be a transparent 1x1 image if no file is found
  • Updated README.md and Added Raspberry Pi section

  • Fixed some open files that weren't closed before processing data read from them

Do not download Source code (zip) or Source code (tar.gz) they are auto generated by GitHub and are missing dependencies.