Skip to content

PSFree Exploit for faster, more stable JailBreak

Compare
Choose a tag to compare
@CrazeeGhost CrazeeGhost released this 16 Feb 23:00
· 1 commit to main since this release
5200c7f

Local PS4 9.00 Jailbreak Host with USB emulation

This project is aimed at setting up a local web host, with USB emulation, on select Raspberry Pi boards that can be used to exploit and jailbreak PS4 consoles running firmware version 9.00. Raspberry Pi Zero W / Pi Zero 2 W / Pi4 B are eligible boards as they support a USB on-the-go (OTG) gadget mode and eliminate the need to manually insert and remove the USB stick required in the exploit process. This project is implemented on a clean Raspberry Pi OS (Debian) install which makes it easier to repurpose the Pi to run additional applications and services on it.

Developed and Tested on Raspberry Pi 4 B but should work on Pi Zero W / Pi Zero 2 W / Pi4 B

Benefits

  • Clean Raspberry Pi OS install - easy to setup the Pi for other purposes as you desire
  • Easily update exploit, GoldHen and payload files from the web interface
  • One device for local web server and USB emulation
  • One USB cable is sufficient to power the Pi and emulate USB
  • You can leave the Pi permanently connected to the PS4. No need not to remove and plug in a USB stick to run explolit

Setup - Easy Method

  1. Write the image provided in the releases to an SD card (using program like Pi Imager or Rufus)
  2. Insert the SD card into the Raspberry Pi
  3. For Pi Zero W & Pi Zero 2W, connect the USB marked Pi USB port to PS4. Be sure to use a cable that supports data transfer

    image
  4. For Pi4 B, connect a USB C cable from Pi to PS4
  5. Power up the PS4. This should also boot up your Pi
  6. Use raspi-config to expand the filesystem to the capacity of your SD card
  7. On the PS4 go to Browser and visit http://<ip.address.of.your.pi>/ps4
  8. Click on the GoldHen button for the version you want to exploit with
    a. A popup will be thrown saying USB emulation started and wait for ps4 pop up
    image

    b. Once the USB message disappears, Click ok
    c. Gold Hen will load automatically
  9. If you need SSH access, username is pi and password is ps4free

Setup - Advanced Method

  1. Install a clean Raspberry Pi OS image to an SD card (Developed and tested on Debian Bullseye)
  2. Enable USB Gadget Mode on the Pi

    a. Add dtoverlay=dwc2,dr_mode=peripheral to the [all] section inside /boot/config.txt
  3. Prevent the Pi from automatically becoming a USB gadget on every boot

    a. Add sudo /sbin/modprobe -r g_mass_storage to /etc/rc.local
  4. Install and setup lighttpd and PHP
  5. Enable fast cgi module for lighttpd

    a. sudo lighttpd-enable-mod fastcgi fastcgi-php

    b. sudo systemctl reload lighttpd.service
  6. Configure /var/www/html/ps4 as the document root directory for the exploit app (via lighttpd configs)
  7. Clone or download the source code from this repo

    a. cd /home/pi

    b. git clone https://github.com/CrazeeGhost/PS4JbEmu.git
  8. Allow the webserver user to run modprobe as root without password

    a. Add www-data ALL=(ALL) NOPASSWD: /sbin/modprobe to your sudoers file using the visudo command
  9. Make the web app accessible to the webserver (will not work if you did not follow the directory strcture in step 8)

    a. cp /home/pi/PS4JbEmu/updateHost.sh /home/pi

    b. sudo chmod 755 /home/pi/updateHost.sh

    c. sudo /home/pi/updateHost.sh
  10. (Optional) Enable auto-updates via cron

    a. sudo crontab -e

    b. */30 * * * * /home/pi/updateHost.sh

Credits

  1. Kameleonre_ - Porting PSFree Exploit
  2. Sleirsgoevy – Webkit, Offline Activator
  3. Chendochap – KeExploit
  4. PaulJenkin – Inspiration for USB Emulation